diff --git a/Dockerfile b/Dockerfile new file mode 100644 index 0000000..f69cfc9 --- /dev/null +++ b/Dockerfile @@ -0,0 +1,34 @@ +# syntax=docker/dockerfile:1 +FROM python:3.11-slim + +WORKDIR /app + +# Runtime + build essentials: +# - rsync: required for file backup/restore +# - ca-certificates: TLS +# - docker-cli: needed if you want to control the host Docker engine (via /var/run/docker.sock mount) +# - make: to delegate install logic to Makefile +# +# Notes: +# - On Debian slim, the docker client package is typically "docker.io". +# - If you only want restore-without-docker, you can drop docker.io later. +RUN apt-get update && apt-get install -y --no-install-recommends \ + make \ + rsync \ + ca-certificates \ + docker-cli \ + && rm -rf /var/lib/apt/lists/* + +# Fail fast if docker client is missing +RUN command -v docker + +COPY . . + +# All install decisions are handled by the Makefile. +RUN make install + +# Sensible defaults (can be overridden at runtime) +ENV PYTHONUNBUFFERED=1 + +# Default: show CLI help +CMD ["baudolo", "--help"] diff --git a/Makefile b/Makefile index 0741c05..36b9234 100644 --- a/Makefile +++ b/Makefile @@ -1,12 +1,41 @@ -.PHONY: test +.PHONY: install build test-e2e -test: - python -m unittest discover -s tests/unit -p "test_*.py" +# Default python if no venv is active +PY_DEFAULT ?= python3 + +IMAGE_NAME ?= baudolo +IMAGE_TAG ?= local +IMAGE := $(IMAGE_NAME):$(IMAGE_TAG) install: - @echo ">> Installation instructions:" - @echo " This software can be installed with pkgmgr under the alias 'baudolo':" - @echo " pkgmgr install baudolo" - @echo "" - @echo " 📦 pkgmgr project page:" - @echo " https://github.com/kevinveenbirkenbach/package-manager" \ No newline at end of file + @set -eu; \ + PY="$(PY_DEFAULT)"; \ + if [ -n "$${VIRTUAL_ENV:-}" ] && [ -x "$${VIRTUAL_ENV}/bin/python" ]; then \ + PY="$${VIRTUAL_ENV}/bin/python"; \ + fi; \ + echo ">>> Using python: $$PY"; \ + "$$PY" -m pip install --upgrade pip; \ + "$$PY" -m pip install -e .; \ + command -v baudolo >/dev/null 2>&1 || { \ + echo "ERROR: baudolo not found on PATH after install"; \ + exit 2; \ + }; \ + baudolo --help >/dev/null 2>&1 || true + +# ------------------------------------------------------------ +# Build the baudolo Docker image +# ------------------------------------------------------------ +build: + @echo ">> Building Docker image $(IMAGE)" + docker build -t $(IMAGE) . + +# ------------------------------------------------------------ +# Run E2E tests inside the container (Docker socket required) +# ------------------------------------------------------------ +# E2E via isolated Docker-in-Docker (DinD) +# - depends on local image build +# - starts a DinD daemon container on a dedicated network +# - loads the freshly built image into DinD +# - runs the unittest suite inside a container that talks to DinD via DOCKER_HOST +test-e2e: build + @bash scripts/test-e2e.sh \ No newline at end of file diff --git a/__init__.py b/Starting similarity index 100% rename from __init__.py rename to Starting diff --git a/Todo.md b/Todo.md deleted file mode 100644 index 3e2d828..0000000 --- a/Todo.md +++ /dev/null @@ -1,2 +0,0 @@ -# Todo -- Verify that restore backup is correct implemented \ No newline at end of file diff --git a/artifacts/debug-dind-20251226141235.txt b/artifacts/debug-dind-20251226141235.txt new file mode 100644 index 0000000..c813d90 --- /dev/null +++ b/artifacts/debug-dind-20251226141235.txt @@ -0,0 +1,35 @@ +=== docker -H ps -a === +CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES +18ef5793cfc5 postgres:16 "docker-entrypoint.s…" 4 seconds ago Up 3 seconds 5432/tcp baudolo-e2e-postgres-nocopy-15d1e23327-pg +875008fe1e9e postgres:16 "docker-entrypoint.s…" 7 seconds ago Up 6 seconds 5432/tcp baudolo-e2e-postgres-full-e9784b8d4b-pg +0b87b8fdc76b mariadb:11 "docker-entrypoint.s…" 44 seconds ago Up 43 seconds 3306/tcp baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb +c5ac9491eae2 mariadb:11 "docker-entrypoint.s…" 54 seconds ago Up 53 seconds 3306/tcp baudolo-e2e-mariadb-full-0790ca5d41-mariadb + +=== docker -H images === +WARNING: This output is designed for human readability. For machine-readable output, please use --format. +IMAGE ID DISK USAGE CONTENT SIZE EXTRA +alpine:3.20 765942a40399 12.2MB 3.71MB +baudolo:local 4fb7be431f63 763MB 368MB +ghcr.io/kevinveenbirkenbach/alpine-rsync:latest 049c6ec3dad7 21.1MB 7.53MB +mariadb:11 1cac8492bd78 465MB 111MB U +postgres:16 d4c3314b2dd7 612MB 136MB U + +=== docker -H network ls === +NETWORK ID NAME DRIVER SCOPE +273bd12dbccf bridge bridge local +6077eae1cce0 host host local +2e037141bfd4 none null local + +=== docker -H volume ls === +DRIVER VOLUME NAME +local baudolo-e2e-mariadb-full-0790ca5d41-mariadb-vol +local baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb-vol +local baudolo-e2e-postgres-full-e9784b8d4b-pg-vol +local baudolo-e2e-postgres-nocopy-15d1e23327-pg-vol + +=== docker -H system df === +TYPE TOTAL ACTIVE SIZE RECLAIMABLE +Images 5 2 1.785GB 1.076GB (60%) +Containers 4 4 90.11kB 0B (0%) +Local Volumes 4 4 433MB 0B (0%) +Build Cache 0 0 0B 0B diff --git a/artifacts/debug-dind-20251226180030.txt b/artifacts/debug-dind-20251226180030.txt new file mode 100644 index 0000000..557e0a6 --- /dev/null +++ b/artifacts/debug-dind-20251226180030.txt @@ -0,0 +1,25 @@ +=== docker -H ps -a === +CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES + +=== docker -H images === +WARNING: This output is designed for human readability. For machine-readable output, please use --format. +IMAGE ID DISK USAGE CONTENT SIZE EXTRA +alpine:3.20 765942a40399 12.2MB 3.71MB +baudolo:local 0bc9b158f3e8 763MB 368MB +ghcr.io/kevinveenbirkenbach/alpine-rsync:latest 049c6ec3dad7 21.1MB 7.53MB + +=== docker -H network ls === +NETWORK ID NAME DRIVER SCOPE +43f0f11bd281 bridge bridge local +2390bc99b893 host host local +0f26ae890b2e none null local + +=== docker -H volume ls === +DRIVER VOLUME NAME + +=== docker -H system df === +TYPE TOTAL ACTIVE SIZE RECLAIMABLE +Images 3 0 796.2MB 10.82kB (0%) +Containers 0 0 0B 0B +Local Volumes 0 0 0B 0B +Build Cache 0 0 0B 0B diff --git a/artifacts/debug-dind-20251226180450.txt b/artifacts/debug-dind-20251226180450.txt new file mode 100644 index 0000000..e51370b --- /dev/null +++ b/artifacts/debug-dind-20251226180450.txt @@ -0,0 +1,25 @@ +=== docker -H ps -a === +CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES + +=== docker -H images === +WARNING: This output is designed for human readability. For machine-readable output, please use --format. +IMAGE ID DISK USAGE CONTENT SIZE EXTRA +alpine:3.20 765942a40399 12.2MB 3.71MB +baudolo:local 84e1ce4363e7 763MB 368MB +ghcr.io/kevinveenbirkenbach/alpine-rsync:latest 049c6ec3dad7 21.1MB 7.53MB + +=== docker -H network ls === +NETWORK ID NAME DRIVER SCOPE +f9303d265b7c bridge bridge local +5bb6398b93ad host host local +bf26d6f0dd45 none null local + +=== docker -H volume ls === +DRIVER VOLUME NAME + +=== docker -H system df === +TYPE TOTAL ACTIVE SIZE RECLAIMABLE +Images 3 0 796.3MB 10.82kB (0%) +Containers 0 0 0B 0B +Local Volumes 0 0 0B 0B +Build Cache 0 0 0B 0B diff --git a/artifacts/debug-host-20251226141235.txt b/artifacts/debug-host-20251226141235.txt new file mode 100644 index 0000000..3d98ae4 --- /dev/null +++ b/artifacts/debug-host-20251226141235.txt @@ -0,0 +1,121 @@ +=== Host docker version === +Client: + Version: 29.1.1 + API version: 1.52 + Go version: go1.25.4 X:nodwarf5 + Git commit: 0aedba58c2 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Context: default + +Server: + Engine: + Version: 29.1.1 + API version: 1.52 (minimum version 1.44) + Go version: go1.25.4 X:nodwarf5 + Git commit: 9a84135d52 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Experimental: false + containerd: + Version: v2.2.0 + GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m + runc: + Version: 1.4.0 + GitCommit: + docker-init: + Version: 0.19.0 + GitCommit: de40ad0 + +=== Host docker info === +Client: + Version: 29.1.1 + Context: default + Debug Mode: false + Plugins: + compose: Docker Compose (Docker Inc.) + Version: 2.40.3 + Path: /usr/lib/docker/cli-plugins/docker-compose + +Server: + Containers: 18 + Running: 17 + Paused: 0 + Stopped: 1 + Images: 79 + Server Version: 29.1.1 + Storage Driver: overlay2 + Backing Filesystem: extfs + Supports d_type: true + Using metacopy: true + Native Overlay Diff: false + userxattr: false + Logging Driver: json-file + Cgroup Driver: systemd + Cgroup Version: 2 + Plugins: + Volume: local + Network: bridge host ipvlan macvlan null overlay + Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog + CDI spec directories: + /etc/cdi + /var/run/cdi + Swarm: inactive + Runtimes: runc io.containerd.runc.v2 + Default Runtime: runc + Init Binary: docker-init + containerd version: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m + runc version: + init version: de40ad0 + Security Options: + apparmor + seccomp + Profile: builtin + cgroupns + Kernel Version: 6.12.62-1-MANJARO + Operating System: Manjaro Linux + OSType: linux + Architecture: x86_64 + CPUs: 20 + Total Memory: 62.5GiB + Name: msi-stealth-gs66 + ID: f68c344d-ed27-440f-8f77-fb048e1a4ea4 + Docker Root Dir: /var/lib/docker + Debug Mode: false + Experimental: false + Insecure Registries: + 127.0.0.0/8 + ::1/128 + Live Restore Enabled: false + Firewall Backend: iptables + + +=== DinD reachable? (docker -H tcp://127.0.0.1:2375 version) === +Client: + Version: 29.1.1 + API version: 1.52 + Go version: go1.25.4 X:nodwarf5 + Git commit: 0aedba58c2 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Context: default + +Server: Docker Engine - Community + Engine: + Version: 29.1.3 + API version: 1.52 (minimum version 1.44) + Go version: go1.25.5 + Git commit: fbf3ed2 + Built: Fri Dec 12 14:51:14 2025 + OS/Arch: linux/amd64 + Experimental: false + containerd: + Version: v2.2.0 + GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41 + runc: + Version: 1.3.4 + GitCommit: v1.3.4-0-gd6d73eb + docker-init: + Version: 0.19.0 + GitCommit: de40ad0 + diff --git a/artifacts/debug-host-20251226180030.txt b/artifacts/debug-host-20251226180030.txt new file mode 100644 index 0000000..ef4a80b --- /dev/null +++ b/artifacts/debug-host-20251226180030.txt @@ -0,0 +1,121 @@ +=== Host docker version === +Client: + Version: 29.1.1 + API version: 1.52 + Go version: go1.25.4 X:nodwarf5 + Git commit: 0aedba58c2 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Context: default + +Server: + Engine: + Version: 29.1.1 + API version: 1.52 (minimum version 1.44) + Go version: go1.25.4 X:nodwarf5 + Git commit: 9a84135d52 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Experimental: false + containerd: + Version: v2.2.0 + GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m + runc: + Version: 1.4.0 + GitCommit: + docker-init: + Version: 0.19.0 + GitCommit: de40ad0 + +=== Host docker info === +Client: + Version: 29.1.1 + Context: default + Debug Mode: false + Plugins: + compose: Docker Compose (Docker Inc.) + Version: 2.40.3 + Path: /usr/lib/docker/cli-plugins/docker-compose + +Server: + Containers: 18 + Running: 17 + Paused: 0 + Stopped: 1 + Images: 83 + Server Version: 29.1.1 + Storage Driver: overlay2 + Backing Filesystem: extfs + Supports d_type: true + Using metacopy: true + Native Overlay Diff: false + userxattr: false + Logging Driver: json-file + Cgroup Driver: systemd + Cgroup Version: 2 + Plugins: + Volume: local + Network: bridge host ipvlan macvlan null overlay + Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog + CDI spec directories: + /etc/cdi + /var/run/cdi + Swarm: inactive + Runtimes: io.containerd.runc.v2 runc + Default Runtime: runc + Init Binary: docker-init + containerd version: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m + runc version: + init version: de40ad0 + Security Options: + apparmor + seccomp + Profile: builtin + cgroupns + Kernel Version: 6.12.62-1-MANJARO + Operating System: Manjaro Linux + OSType: linux + Architecture: x86_64 + CPUs: 20 + Total Memory: 62.5GiB + Name: msi-stealth-gs66 + ID: f68c344d-ed27-440f-8f77-fb048e1a4ea4 + Docker Root Dir: /var/lib/docker + Debug Mode: false + Experimental: false + Insecure Registries: + 127.0.0.0/8 + ::1/128 + Live Restore Enabled: false + Firewall Backend: iptables + + +=== DinD reachable? (docker -H tcp://127.0.0.1:2375 version) === +Client: + Version: 29.1.1 + API version: 1.52 + Go version: go1.25.4 X:nodwarf5 + Git commit: 0aedba58c2 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Context: default + +Server: Docker Engine - Community + Engine: + Version: 29.1.3 + API version: 1.52 (minimum version 1.44) + Go version: go1.25.5 + Git commit: fbf3ed2 + Built: Fri Dec 12 14:51:14 2025 + OS/Arch: linux/amd64 + Experimental: false + containerd: + Version: v2.2.0 + GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41 + runc: + Version: 1.3.4 + GitCommit: v1.3.4-0-gd6d73eb + docker-init: + Version: 0.19.0 + GitCommit: de40ad0 + diff --git a/artifacts/debug-host-20251226180450.txt b/artifacts/debug-host-20251226180450.txt new file mode 100644 index 0000000..6b5deca --- /dev/null +++ b/artifacts/debug-host-20251226180450.txt @@ -0,0 +1,121 @@ +=== Host docker version === +Client: + Version: 29.1.1 + API version: 1.52 + Go version: go1.25.4 X:nodwarf5 + Git commit: 0aedba58c2 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Context: default + +Server: + Engine: + Version: 29.1.1 + API version: 1.52 (minimum version 1.44) + Go version: go1.25.4 X:nodwarf5 + Git commit: 9a84135d52 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Experimental: false + containerd: + Version: v2.2.0 + GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m + runc: + Version: 1.4.0 + GitCommit: + docker-init: + Version: 0.19.0 + GitCommit: de40ad0 + +=== Host docker info === +Client: + Version: 29.1.1 + Context: default + Debug Mode: false + Plugins: + compose: Docker Compose (Docker Inc.) + Version: 2.40.3 + Path: /usr/lib/docker/cli-plugins/docker-compose + +Server: + Containers: 18 + Running: 17 + Paused: 0 + Stopped: 1 + Images: 87 + Server Version: 29.1.1 + Storage Driver: overlay2 + Backing Filesystem: extfs + Supports d_type: true + Using metacopy: true + Native Overlay Diff: false + userxattr: false + Logging Driver: json-file + Cgroup Driver: systemd + Cgroup Version: 2 + Plugins: + Volume: local + Network: bridge host ipvlan macvlan null overlay + Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog + CDI spec directories: + /etc/cdi + /var/run/cdi + Swarm: inactive + Runtimes: io.containerd.runc.v2 runc + Default Runtime: runc + Init Binary: docker-init + containerd version: 1c4457e00facac03ce1d75f7b6777a7a851e5c41.m + runc version: + init version: de40ad0 + Security Options: + apparmor + seccomp + Profile: builtin + cgroupns + Kernel Version: 6.12.62-1-MANJARO + Operating System: Manjaro Linux + OSType: linux + Architecture: x86_64 + CPUs: 20 + Total Memory: 62.5GiB + Name: msi-stealth-gs66 + ID: f68c344d-ed27-440f-8f77-fb048e1a4ea4 + Docker Root Dir: /var/lib/docker + Debug Mode: false + Experimental: false + Insecure Registries: + 127.0.0.0/8 + ::1/128 + Live Restore Enabled: false + Firewall Backend: iptables + + +=== DinD reachable? (docker -H tcp://127.0.0.1:2375 version) === +Client: + Version: 29.1.1 + API version: 1.52 + Go version: go1.25.4 X:nodwarf5 + Git commit: 0aedba58c2 + Built: Fri Nov 28 14:28:26 2025 + OS/Arch: linux/amd64 + Context: default + +Server: Docker Engine - Community + Engine: + Version: 29.1.3 + API version: 1.52 (minimum version 1.44) + Go version: go1.25.5 + Git commit: fbf3ed2 + Built: Fri Dec 12 14:51:14 2025 + OS/Arch: linux/amd64 + Experimental: false + containerd: + Version: v2.2.0 + GitCommit: 1c4457e00facac03ce1d75f7b6777a7a851e5c41 + runc: + Version: 1.3.4 + GitCommit: v1.3.4-0-gd6d73eb + docker-init: + Version: 0.19.0 + GitCommit: de40ad0 + diff --git a/artifacts/dind-events-20251226141235.txt b/artifacts/dind-events-20251226141235.txt new file mode 100644 index 0000000..f4946b8 --- /dev/null +++ b/artifacts/dind-events-20251226141235.txt @@ -0,0 +1,125 @@ +2025-12-26T14:12:41.198580901+01:00 image pull ghcr.io/kevinveenbirkenbach/alpine-rsync:latest (name=ghcr.io/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.created=2025-12-26T11:16:41.250Z, org.opencontainers.image.description=alpine image with rsync, org.opencontainers.image.licenses=AGPL-3.0, org.opencontainers.image.revision=44d48fb12106e82de8e0bb9c374f6a2c0c2b542c, org.opencontainers.image.source=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.title=alpine-rsync, org.opencontainers.image.url=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.version=main) +2025-12-26T14:12:45.133326142+01:00 image pull alpine:3.20 (name=alpine) +2025-12-26T14:12:49.461261470+01:00 image load sha256:4fb7be431f6313dc97e12fe2b3b4bae98a938f28fe12d44ff5214c9ec78b3f25 (name=sha256:4fb7be431f6313dc97e12fe2b3b4bae98a938f28fe12d44ff5214c9ec78b3f25) +2025-12-26T14:12:50.069197321+01:00 volume create baudolo-e2e-files-full-f0b22fe71a-vol-src (driver=local) +2025-12-26T14:12:50.235055365+01:00 container create 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt) +2025-12-26T14:12:50.237279995+01:00 container attach 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt) +2025-12-26T14:12:50.255948524+01:00 volume mount baudolo-e2e-files-full-f0b22fe71a-vol-src (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, destination=/data, driver=local, propagation=, read/write=true) +2025-12-26T14:12:50.446943898+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, name=bridge, type=bridge) +2025-12-26T14:12:50.482329463+01:00 container start 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt) +2025-12-26T14:12:50.643601381+01:00 network disconnect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, name=bridge, type=bridge) +2025-12-26T14:12:50.665142404+01:00 volume unmount baudolo-e2e-files-full-f0b22fe71a-vol-src (container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1, driver=local) +2025-12-26T14:12:50.686339473+01:00 container die 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (execDuration=0, exitCode=0, image=alpine:3.20, name=zen_northcutt) +2025-12-26T14:12:50.753769595+01:00 container destroy 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 (image=alpine:3.20, name=zen_northcutt) +2025-12-26T14:12:51.102070909+01:00 volume destroy baudolo-e2e-files-full-f0b22fe71a-vol-src (driver=local) +2025-12-26T14:12:51.141802271+01:00 volume create baudolo-e2e-files-nocopy-1a172b8088-vol-src (driver=local) +2025-12-26T14:12:51.275100676+01:00 container create 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth) +2025-12-26T14:12:51.277163983+01:00 container attach 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth) +2025-12-26T14:12:51.295769885+01:00 volume mount baudolo-e2e-files-nocopy-1a172b8088-vol-src (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, destination=/data, driver=local, propagation=, read/write=true) +2025-12-26T14:12:51.448766298+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, name=bridge, type=bridge) +2025-12-26T14:12:51.485884843+01:00 container start 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth) +2025-12-26T14:12:51.660953012+01:00 network disconnect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, name=bridge, type=bridge) +2025-12-26T14:12:51.682098008+01:00 volume unmount baudolo-e2e-files-nocopy-1a172b8088-vol-src (container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334, driver=local) +2025-12-26T14:12:51.703353364+01:00 container die 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (execDuration=0, exitCode=0, image=alpine:3.20, name=frosty_booth) +2025-12-26T14:12:51.763171429+01:00 container destroy 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 (image=alpine:3.20, name=frosty_booth) +2025-12-26T14:12:52.049154745+01:00 volume destroy baudolo-e2e-files-nocopy-1a172b8088-vol-src (driver=local) +2025-12-26T14:12:52.089068641+01:00 volume create baudolo-e2e-mariadb-full-0790ca5d41-mariadb-vol (driver=local) +2025-12-26T14:13:13.530756972+01:00 image pull mariadb:11 (name=mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:13.887062438+01:00 container create c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:13.906656801+01:00 volume mount baudolo-e2e-mariadb-full-0790ca5d41-mariadb-vol (container=c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b, destination=/var/lib/mysql, driver=local, propagation=, read/write=true) +2025-12-26T14:13:14.088244508+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b, name=bridge, type=bridge) +2025-12-26T14:13:14.124633552+01:00 container start c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:14.136103009+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=25c368895719afe0d698bcf4a98509c797574c568e38ada08e00bf0f6664ce2e, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:14.136886083+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=25c368895719afe0d698bcf4a98509c797574c568e38ada08e00bf0f6664ce2e, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:14.192400683+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=25c368895719afe0d698bcf4a98509c797574c568e38ada08e00bf0f6664ce2e, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:15.203778795+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=6db98dd0a7a6739018bfae6e772472e1d24a70614bb990810327b94e7d69a304, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:15.204313114+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=6db98dd0a7a6739018bfae6e772472e1d24a70614bb990810327b94e7d69a304, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:15.298707655+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=6db98dd0a7a6739018bfae6e772472e1d24a70614bb990810327b94e7d69a304, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:16.308880522+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=dda886689926a5733b6d26abb50ccb9fac6c36cd94a1f2072dfce9819c3ae2f4, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:16.309586271+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=dda886689926a5733b6d26abb50ccb9fac6c36cd94a1f2072dfce9819c3ae2f4, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:16.398480757+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=dda886689926a5733b6d26abb50ccb9fac6c36cd94a1f2072dfce9819c3ae2f4, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:17.409340865+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=0bfa22af92cc123a356dd4d3aafb5fc50c458b9cec0ad748ceac46368acd0230, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:17.410031002+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=0bfa22af92cc123a356dd4d3aafb5fc50c458b9cec0ad748ceac46368acd0230, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:17.498639004+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=0bfa22af92cc123a356dd4d3aafb5fc50c458b9cec0ad748ceac46368acd0230, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:18.509268972+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=aa19a25f00ce6be43ade4aa09af6d2f89243bb626aa167d69fdf675beae727eb, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:18.510125815+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=aa19a25f00ce6be43ade4aa09af6d2f89243bb626aa167d69fdf675beae727eb, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:18.573652137+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=aa19a25f00ce6be43ade4aa09af6d2f89243bb626aa167d69fdf675beae727eb, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:19.585570745+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=edfebcae144b529f4466136c11213a95d52f9afa92c1fa75feedb42dee400105, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:19.586032588+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=edfebcae144b529f4466136c11213a95d52f9afa92c1fa75feedb42dee400105, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:19.647530562+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=edfebcae144b529f4466136c11213a95d52f9afa92c1fa75feedb42dee400105, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:20.659543769+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=4fe17b5868bdde99633ca6048f72583cd1e649d0fe3d1c4d89e4403119cf4895, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:20.660269360+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=4fe17b5868bdde99633ca6048f72583cd1e649d0fe3d1c4d89e4403119cf4895, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:20.738212597+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=4fe17b5868bdde99633ca6048f72583cd1e649d0fe3d1c4d89e4403119cf4895, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:21.749334016+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=f8179f3a975fe3e2b1824def3e1535a304f8e017e4b9554874f84899cbd43290, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:21.750064184+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=f8179f3a975fe3e2b1824def3e1535a304f8e017e4b9554874f84899cbd43290, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:21.821784307+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=f8179f3a975fe3e2b1824def3e1535a304f8e017e4b9554874f84899cbd43290, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:22.832155681+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=b0f1ff5b4b8b4f36b08306bb6f3c363dd550a1e15322ae995c834fa3451b1828, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:22.832953999+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=b0f1ff5b4b8b4f36b08306bb6f3c363dd550a1e15322ae995c834fa3451b1828, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:22.905555595+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=b0f1ff5b4b8b4f36b08306bb6f3c363dd550a1e15322ae995c834fa3451b1828, exitCode=0, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:22.915870140+01:00 container exec_create: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=12daffe77867c29f0c7d14e64a9eda5706cd46ece5d5dec53cbb13c5e24e00ad, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:22.916786809+01:00 container exec_start: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=12daffe77867c29f0c7d14e64a9eda5706cd46ece5d5dec53cbb13c5e24e00ad, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:22.987238735+01:00 container exec_die c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b (execID=12daffe77867c29f0c7d14e64a9eda5706cd46ece5d5dec53cbb13c5e24e00ad, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-full-0790ca5d41-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:23.022997879+01:00 volume create baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb-vol (driver=local) +2025-12-26T14:13:23.211777653+01:00 container create 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:23.234973354+01:00 volume mount baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb-vol (container=0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f, destination=/var/lib/mysql, driver=local, propagation=, read/write=true) +2025-12-26T14:13:23.434394198+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f, name=bridge, type=bridge) +2025-12-26T14:13:23.483918185+01:00 container start 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:23.495865358+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=bce663783b34f1cd8ff5dc38563da7aced57a21c74f85101882ebe1cc1f4bc3d, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:23.496563367+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=bce663783b34f1cd8ff5dc38563da7aced57a21c74f85101882ebe1cc1f4bc3d, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:23.563402365+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=bce663783b34f1cd8ff5dc38563da7aced57a21c74f85101882ebe1cc1f4bc3d, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:24.575320221+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=9505e1a8c580f650758aebc0625a1b99d4ed46d84bf5a4628ed81503ebe9be07, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:24.575997988+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=9505e1a8c580f650758aebc0625a1b99d4ed46d84bf5a4628ed81503ebe9be07, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:24.655874626+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=9505e1a8c580f650758aebc0625a1b99d4ed46d84bf5a4628ed81503ebe9be07, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:25.665903138+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=73096c64d7deabeeefe0445b73f037617acd8fbdfbacd7dc98662c05135c3017, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:25.666433841+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=73096c64d7deabeeefe0445b73f037617acd8fbdfbacd7dc98662c05135c3017, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:25.737265107+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=73096c64d7deabeeefe0445b73f037617acd8fbdfbacd7dc98662c05135c3017, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:26.747973203+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=8bb42d9bb85effda41dba69913fe5cd5c97fb9cf35a0c31444ef44711691847a, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:26.748696717+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=8bb42d9bb85effda41dba69913fe5cd5c97fb9cf35a0c31444ef44711691847a, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:26.802608451+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=8bb42d9bb85effda41dba69913fe5cd5c97fb9cf35a0c31444ef44711691847a, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:27.813334836+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=e7c0e3b0f937b37addd50791d893f39dfded5b045debe2906820d7649338cd9e, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:27.814178343+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=e7c0e3b0f937b37addd50791d893f39dfded5b045debe2906820d7649338cd9e, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:27.899145142+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=e7c0e3b0f937b37addd50791d893f39dfded5b045debe2906820d7649338cd9e, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:28.909816912+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=0ff7490c0d56be23728fd1d089d52de46e6f811f9125e9033cd9d371c7ac17a3, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:28.910597354+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=0ff7490c0d56be23728fd1d089d52de46e6f811f9125e9033cd9d371c7ac17a3, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:28.975385649+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=0ff7490c0d56be23728fd1d089d52de46e6f811f9125e9033cd9d371c7ac17a3, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:29.985969275+01:00 container exec_create: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=95e541df0d7495e0e317e2f7032906c23be450e78e3544db6aa5bc14a1f5f6b7, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:29.986716701+01:00 container exec_start: sh -lc mariadb-admin -uroot -prootpw ping -h localhost 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=95e541df0d7495e0e317e2f7032906c23be450e78e3544db6aa5bc14a1f5f6b7, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:30.086972407+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=95e541df0d7495e0e317e2f7032906c23be450e78e3544db6aa5bc14a1f5f6b7, exitCode=0, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:30.096237769+01:00 container exec_create: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=d94252b163f8ea17f17f901859837ecdc80327c05dfca36503b4fddfdf6b5823, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:30.096993155+01:00 container exec_start: sh -lc mariadb -uroot -prootpw -e "CREATE DATABASE appdb; CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); INSERT INTO appdb.t VALUES (1,'ok');" 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=d94252b163f8ea17f17f901859837ecdc80327c05dfca36503b4fddfdf6b5823, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:30.164696413+01:00 container exec_die 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f (execID=d94252b163f8ea17f17f901859837ecdc80327c05dfca36503b4fddfdf6b5823, exitCode=1, image=mariadb:11, name=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb, org.opencontainers.image.authors=MariaDB Community, org.opencontainers.image.base.name=docker.io/library/ubuntu:noble, org.opencontainers.image.description=MariaDB Database for relational SQL, org.opencontainers.image.documentation=https://hub.docker.com/_/mariadb/, org.opencontainers.image.licenses=GPL-2.0, org.opencontainers.image.ref.name=ubuntu, org.opencontainers.image.source=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.title=MariaDB Database, org.opencontainers.image.url=https://github.com/MariaDB/mariadb-docker, org.opencontainers.image.vendor=MariaDB Community, org.opencontainers.image.version=11.8.5) +2025-12-26T14:13:30.195960077+01:00 volume create baudolo-e2e-postgres-full-e9784b8d4b-pg-vol (driver=local) +2025-12-26T14:14:00.555389090+01:00 image pull postgres:16 (name=postgres) +2025-12-26T14:14:00.854940131+01:00 container create 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:00.874215442+01:00 volume mount baudolo-e2e-postgres-full-e9784b8d4b-pg-vol (container=875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f, destination=/var/lib/postgresql/data, driver=local, propagation=, read/write=true) +2025-12-26T14:14:01.057089403+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f, name=bridge, type=bridge) +2025-12-26T14:14:01.090659145+01:00 container start 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:01.102872260+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=440cd4f2d6c371430480b9cfed773ad5f398dc2e51c290ef5965d7053207f92f, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:01.103435051+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=440cd4f2d6c371430480b9cfed773ad5f398dc2e51c290ef5965d7053207f92f, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:01.174777107+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=440cd4f2d6c371430480b9cfed773ad5f398dc2e51c290ef5965d7053207f92f, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:02.184795425+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=b6c2bf961069d25c7521efbceb97c68b582384d27e7657350a182d224aa27fd2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:02.185507858+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=b6c2bf961069d25c7521efbceb97c68b582384d27e7657350a182d224aa27fd2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:02.235002365+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=b6c2bf961069d25c7521efbceb97c68b582384d27e7657350a182d224aa27fd2, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:03.245410693+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=6991766e6e74a1386b16f77dd3b83b075ae8bceddcaf1eaa5edb9f6210e51fb9, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:03.246196281+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=6991766e6e74a1386b16f77dd3b83b075ae8bceddcaf1eaa5edb9f6210e51fb9, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:03.309711403+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=6991766e6e74a1386b16f77dd3b83b075ae8bceddcaf1eaa5edb9f6210e51fb9, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:03.319880835+01:00 container exec_create: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=17ff3881b175cd2e7ffcd0dc1994bd2eb4b6a725871b6428743af4178bbc9c13, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:03.320618670+01:00 container exec_start: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=17ff3881b175cd2e7ffcd0dc1994bd2eb4b6a725871b6428743af4178bbc9c13, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:03.447110110+01:00 container exec_die 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f (execID=17ff3881b175cd2e7ffcd0dc1994bd2eb4b6a725871b6428743af4178bbc9c13, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-full-e9784b8d4b-pg) +2025-12-26T14:14:03.758176891+01:00 volume create baudolo-e2e-postgres-nocopy-15d1e23327-pg-vol (driver=local) +2025-12-26T14:14:03.920079355+01:00 container create 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:03.940018672+01:00 volume mount baudolo-e2e-postgres-nocopy-15d1e23327-pg-vol (container=18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702, destination=/var/lib/postgresql/data, driver=local, propagation=, read/write=true) +2025-12-26T14:14:04.108324382+01:00 network connect 273bd12dbccf26e307a64aef5eecef0cb72c68114f8193cfb35919f5b256bdcb (container=18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702, name=bridge, type=bridge) +2025-12-26T14:14:04.142411599+01:00 container start 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:04.154193197+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=0d800e458aa1e871f9bb8b7f323593d38cd20b063113d79cf80f05892ddbd217, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:04.154831705+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=0d800e458aa1e871f9bb8b7f323593d38cd20b063113d79cf80f05892ddbd217, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:04.234431100+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=0d800e458aa1e871f9bb8b7f323593d38cd20b063113d79cf80f05892ddbd217, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:05.246575645+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=d8176dffa8a2185e6a3ddfd134d9ba4cf6186bab4b36088df4bed3376c278ff4, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:05.247199022+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=d8176dffa8a2185e6a3ddfd134d9ba4cf6186bab4b36088df4bed3376c278ff4, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:05.304014067+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=d8176dffa8a2185e6a3ddfd134d9ba4cf6186bab4b36088df4bed3376c278ff4, exitCode=2, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:06.315732563+01:00 container exec_create: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=95d21955662aac0b324739e40cddfb071e5339a3f907b1e59312ccb4b3048122, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:06.316395085+01:00 container exec_start: sh -lc pg_isready -U postgres -h localhost 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=95d21955662aac0b324739e40cddfb071e5339a3f907b1e59312ccb4b3048122, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:06.391285156+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=95d21955662aac0b324739e40cddfb071e5339a3f907b1e59312ccb4b3048122, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:06.401297303+01:00 container exec_create: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=b98057fde637245f1458cee7e5490afc371851c2d442304ba928231d77f32324, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:06.402103207+01:00 container exec_start: sh -lc psql -U postgres -d appdb -c "CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');" 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=b98057fde637245f1458cee7e5490afc371851c2d442304ba928231d77f32324, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) +2025-12-26T14:14:06.520047896+01:00 container exec_die 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702 (execID=b98057fde637245f1458cee7e5490afc371851c2d442304ba928231d77f32324, exitCode=0, image=postgres:16, name=baudolo-e2e-postgres-nocopy-15d1e23327-pg) diff --git a/artifacts/dind-events-20251226180030.txt b/artifacts/dind-events-20251226180030.txt new file mode 100644 index 0000000..e72cec2 --- /dev/null +++ b/artifacts/dind-events-20251226180030.txt @@ -0,0 +1,13 @@ +2025-12-26T18:00:43.105600680+01:00 image pull ghcr.io/kevinveenbirkenbach/alpine-rsync:latest (name=ghcr.io/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.created=2025-12-26T11:16:41.250Z, org.opencontainers.image.description=alpine image with rsync, org.opencontainers.image.licenses=AGPL-3.0, org.opencontainers.image.revision=44d48fb12106e82de8e0bb9c374f6a2c0c2b542c, org.opencontainers.image.source=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.title=alpine-rsync, org.opencontainers.image.url=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.version=main) +2025-12-26T18:00:48.233210218+01:00 image pull alpine:3.20 (name=alpine) +2025-12-26T18:00:52.495680501+01:00 image load sha256:0bc9b158f3e8edb2e5a131a12d51edba2b2954e1edc626c4ad989581fd8bb562 (name=sha256:0bc9b158f3e8edb2e5a131a12d51edba2b2954e1edc626c4ad989581fd8bb562) +2025-12-26T18:00:53.087729138+01:00 volume create baudolo-e2e-files-full-45d7677d08-vol-src (driver=local) +2025-12-26T18:00:53.236672233+01:00 container create debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder) +2025-12-26T18:00:53.238392166+01:00 container attach debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder) +2025-12-26T18:00:53.257319926+01:00 volume mount baudolo-e2e-files-full-45d7677d08-vol-src (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, destination=/data, driver=local, propagation=, read/write=true) +2025-12-26T18:00:53.434210509+01:00 network connect 43f0f11bd2813c28b15d0f2b1d59875b2457c70aaef10ff7a309d57279bcf39e (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, name=bridge, type=bridge) +2025-12-26T18:00:53.469302289+01:00 container start debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder) +2025-12-26T18:00:53.625702613+01:00 network disconnect 43f0f11bd2813c28b15d0f2b1d59875b2457c70aaef10ff7a309d57279bcf39e (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, name=bridge, type=bridge) +2025-12-26T18:00:53.636946550+01:00 volume unmount baudolo-e2e-files-full-45d7677d08-vol-src (container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45, driver=local) +2025-12-26T18:00:53.657329988+01:00 container die debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (execDuration=0, exitCode=0, image=alpine:3.20, name=elated_snyder) +2025-12-26T18:00:53.724058321+01:00 container destroy debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 (image=alpine:3.20, name=elated_snyder) diff --git a/artifacts/dind-events-20251226180450.txt b/artifacts/dind-events-20251226180450.txt new file mode 100644 index 0000000..c9d1328 --- /dev/null +++ b/artifacts/dind-events-20251226180450.txt @@ -0,0 +1,14 @@ +2025-12-26T18:04:57.729650330+01:00 image pull ghcr.io/kevinveenbirkenbach/alpine-rsync:latest (name=ghcr.io/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.created=2025-12-26T11:16:41.250Z, org.opencontainers.image.description=alpine image with rsync, org.opencontainers.image.licenses=AGPL-3.0, org.opencontainers.image.revision=44d48fb12106e82de8e0bb9c374f6a2c0c2b542c, org.opencontainers.image.source=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.title=alpine-rsync, org.opencontainers.image.url=https://github.com/kevinveenbirkenbach/alpine-rsync, org.opencontainers.image.version=main) +2025-12-26T18:05:02.774379357+01:00 image pull alpine:3.20 (name=alpine) +2025-12-26T18:05:07.091956837+01:00 image load sha256:84e1ce4363e7f6880bbc55dce81bd8bc3d0cd35db78f6b625f6693eb28f26d46 (name=sha256:84e1ce4363e7f6880bbc55dce81bd8bc3d0cd35db78f6b625f6693eb28f26d46) +2025-12-26T18:05:07.706443392+01:00 volume create baudolo-e2e-files-full-468c9a54be-vol-src (driver=local) +2025-12-26T18:05:07.876060673+01:00 container create f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon) +2025-12-26T18:05:07.878097650+01:00 container attach f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon) +2025-12-26T18:05:07.897098146+01:00 volume mount baudolo-e2e-files-full-468c9a54be-vol-src (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, destination=/data, driver=local, propagation=, read/write=true) +2025-12-26T18:05:08.083750320+01:00 network connect f9303d265b7c4eadd53194f11a7203398a0fb64cacedec113668cea7448632a3 (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, name=bridge, type=bridge) +2025-12-26T18:05:08.117011831+01:00 container start f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon) +2025-12-26T18:05:08.286072714+01:00 network disconnect f9303d265b7c4eadd53194f11a7203398a0fb64cacedec113668cea7448632a3 (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, name=bridge, type=bridge) +2025-12-26T18:05:08.306579097+01:00 volume unmount baudolo-e2e-files-full-468c9a54be-vol-src (container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f, driver=local) +2025-12-26T18:05:08.326825706+01:00 container die f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (execDuration=0, exitCode=0, image=alpine:3.20, name=eloquent_solomon) +2025-12-26T18:05:08.391069360+01:00 container destroy f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f (image=alpine:3.20, name=eloquent_solomon) +2025-12-26T18:05:08.792526442+01:00 volume destroy baudolo-e2e-files-full-468c9a54be-vol-src (driver=local) diff --git a/artifacts/dind-logs-20251226141235.txt b/artifacts/dind-logs-20251226141235.txt new file mode 100644 index 0000000..e7bb97e --- /dev/null +++ b/artifacts/dind-logs-20251226141235.txt @@ -0,0 +1,134 @@ +cat: can't open '/proc/net/ip6_tables_names': No such file or directory +cat: can't open '/proc/net/arp_tables_names': No such file or directory +iptables v1.8.11 (nf_tables) +time="2025-12-26T13:12:35.607239802Z" level=info msg="Starting up" +time="2025-12-26T13:12:35.607448321Z" level=warning msg="Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network." host="tcp://0.0.0.0:2375" +time="2025-12-26T13:12:35.607454883Z" level=warning msg="Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!" host="tcp://0.0.0.0:2375" +time="2025-12-26T13:12:35.607457761Z" level=warning msg="[DEPRECATION NOTICE] In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" host="tcp://0.0.0.0:2375" +time="2025-12-26T13:12:36.607996436Z" level=info msg="containerd not running, starting managed containerd" +time="2025-12-26T13:12:36.608758080Z" level=info msg="started new containerd process" address=/var/run/docker/containerd/containerd.sock module=libcontainerd pid=38 +time="2025-12-26T13:12:36.617804077Z" level=info msg="starting containerd" revision=1c4457e00facac03ce1d75f7b6777a7a851e5c41 version=v2.2.0 +time="2025-12-26T13:12:36.622418653Z" level=warning msg="Configuration migrated from version 2, use `containerd config migrate` to avoid migration" t="2.104µs" +time="2025-12-26T13:12:36.622438034Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1 +time="2025-12-26T13:12:36.622465608Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1 +time="2025-12-26T13:12:36.622474615Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1 +time="2025-12-26T13:12:36.622633460Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1 +time="2025-12-26T13:12:36.622646333Z" level=info msg="loading plugin" id=io.containerd.mount-handler.v1.erofs type=io.containerd.mount-handler.v1 +time="2025-12-26T13:12:36.622653404Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.622691099Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.622699155Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.622720446Z" level=info msg="skip loading plugin" error="devmapper not configured: skip plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.622726589Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.622839203Z" level=info msg="skip loading plugin" error="EROFS unsupported, please `modprobe erofs`: skip plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.622850172Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.622903679Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.623020836Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.623045341Z" level=info msg="skip loading plugin" error="lstat /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs: no such file or directory: skip plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 +time="2025-12-26T13:12:36.623053379Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1 +time="2025-12-26T13:12:36.623071367Z" level=info msg="loading plugin" id=io.containerd.monitor.task.v1.cgroups type=io.containerd.monitor.task.v1 +time="2025-12-26T13:12:36.623184820Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1 +time="2025-12-26T13:12:36.623223325Z" level=info msg="metadata content store policy set" policy=shared +time="2025-12-26T13:12:36.669034596Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1 +time="2025-12-26T13:12:36.669104777Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1 +time="2025-12-26T13:12:36.669134319Z" level=info msg="built-in NRI default validator is disabled" +time="2025-12-26T13:12:36.669139961Z" level=info msg="runtime interface created" +time="2025-12-26T13:12:36.669143234Z" level=info msg="created NRI interface" +time="2025-12-26T13:12:36.669149993Z" level=info msg="loading plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 +time="2025-12-26T13:12:36.669265965Z" level=info msg="skip loading plugin" error="failed to check mkfs.erofs availability: failed to run mkfs.erofs --help: exec: \"mkfs.erofs\": executable file not found in $PATH: skip plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 +time="2025-12-26T13:12:36.669276775Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1 +time="2025-12-26T13:12:36.669286109Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1 +time="2025-12-26T13:12:36.669293623Z" level=info msg="loading plugin" id=io.containerd.mount-manager.v1.bolt type=io.containerd.mount-manager.v1 +time="2025-12-26T13:12:36.680202251Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680236484Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680245733Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680257639Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680272631Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680281754Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680289097Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680296494Z" level=info msg="loading plugin" id=io.containerd.shim.v1.manager type=io.containerd.shim.v1 +time="2025-12-26T13:12:36.680304796Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2 +time="2025-12-26T13:12:36.680492159Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1 +time="2025-12-26T13:12:36.680510697Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680519856Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680527108Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680538702Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680545781Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680553487Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680560942Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680569212Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.mounts type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680576118Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.680584646Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1 +time="2025-12-26T13:12:36.680591336Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1 +time="2025-12-26T13:12:36.680616357Z" level=info msg="loading plugin" id=io.containerd.cri.v1.images type=io.containerd.cri.v1 +time="2025-12-26T13:12:36.680648761Z" level=info msg="Get image filesystem path \"/var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\"" +time="2025-12-26T13:12:36.680657983Z" level=info msg="Start snapshots syncer" +time="2025-12-26T13:12:36.680676626Z" level=info msg="loading plugin" id=io.containerd.cri.v1.runtime type=io.containerd.cri.v1 +time="2025-12-26T13:12:36.680840549Z" level=info msg="starting cri plugin" config="{\"containerd\":{\"defaultRuntimeName\":\"runc\",\"runtimes\":{\"runc\":{\"runtimeType\":\"io.containerd.runc.v2\",\"runtimePath\":\"\",\"PodAnnotations\":null,\"ContainerAnnotations\":null,\"options\":{\"BinaryName\":\"\",\"CriuImagePath\":\"\",\"CriuWorkPath\":\"\",\"IoGid\":0,\"IoUid\":0,\"NoNewKeyring\":false,\"Root\":\"\",\"ShimCgroup\":\"\",\"SystemdCgroup\":false},\"privileged_without_host_devices\":false,\"privileged_without_host_devices_all_devices_allowed\":false,\"cgroupWritable\":false,\"baseRuntimeSpec\":\"\",\"cniConfDir\":\"\",\"cniMaxConfNum\":0,\"snapshotter\":\"\",\"sandboxer\":\"podsandbox\",\"io_type\":\"\"}},\"ignoreBlockIONotEnabledErrors\":false,\"ignoreRdtNotEnabledErrors\":false},\"cni\":{\"binDir\":\"\",\"binDirs\":[\"/opt/cni/bin\"],\"confDir\":\"/etc/cni/net.d\",\"maxConfNum\":1,\"setupSerially\":false,\"confTemplate\":\"\",\"ipPref\":\"\",\"useInternalLoopback\":false},\"enableSelinux\":false,\"selinuxCategoryRange\":1024,\"maxContainerLogLineSize\":16384,\"disableApparmor\":false,\"restrictOOMScoreAdj\":false,\"disableProcMount\":false,\"unsetSeccompProfile\":\"\",\"tolerateMissingHugetlbController\":true,\"disableHugetlbController\":true,\"device_ownership_from_security_context\":false,\"ignoreImageDefinedVolumes\":false,\"netnsMountsUnderStateDir\":false,\"enableUnprivilegedPorts\":true,\"enableUnprivilegedICMP\":true,\"enableCDI\":true,\"cdiSpecDirs\":[\"/etc/cdi\",\"/var/run/cdi\"],\"drainExecSyncIOTimeout\":\"0s\",\"ignoreDeprecationWarnings\":null,\"containerdRootDir\":\"/var/lib/docker/containerd/daemon\",\"containerdEndpoint\":\"/var/run/docker/containerd/containerd.sock\",\"rootDir\":\"/var/lib/docker/containerd/daemon/io.containerd.grpc.v1.cri\",\"stateDir\":\"/var/run/docker/containerd/daemon/io.containerd.grpc.v1.cri\"}" +time="2025-12-26T13:12:36.680887507Z" level=info msg="loading plugin" id=io.containerd.podsandbox.controller.v1.podsandbox type=io.containerd.podsandbox.controller.v1 +time="2025-12-26T13:12:36.680919435Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1 +time="2025-12-26T13:12:36.681022329Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681039655Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681047783Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681063337Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1 +time="2025-12-26T13:12:36.681071624Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681079067Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681086621Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681096033Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681103407Z" level=info msg="loading plugin" id=io.containerd.monitor.container.v1.restart type=io.containerd.monitor.container.v1 +time="2025-12-26T13:12:36.681128288Z" level=info msg="loading plugin" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 +time="2025-12-26T13:12:36.681139875Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 +time="2025-12-26T13:12:36.681146627Z" level=info msg="loading plugin" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 +time="2025-12-26T13:12:36.681153149Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 +time="2025-12-26T13:12:36.681159434Z" level=info msg="loading plugin" id=io.containerd.ttrpc.v1.otelttrpc type=io.containerd.ttrpc.v1 +time="2025-12-26T13:12:36.681167042Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1 +time="2025-12-26T13:12:36.681336396Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock +time="2025-12-26T13:12:36.681387990Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock.ttrpc +time="2025-12-26T13:12:36.681425600Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock +time="2025-12-26T13:12:36.681440829Z" level=info msg="containerd successfully booted in 0.064165s" +time="2025-12-26T13:12:36.684626150Z" level=info msg="OTEL tracing is not configured, using no-op tracer provider" +time="2025-12-26T13:12:36.684700068Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/var/run/cdi +time="2025-12-26T13:12:36.684708372Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/etc/cdi +time="2025-12-26T13:12:36.690649847Z" level=info msg="Creating a containerd client" address=/var/run/docker/containerd/containerd.sock timeout=1m0s +time="2025-12-26T13:12:36.744755094Z" level=info msg="Loading containers: start." +time="2025-12-26T13:12:36.744783313Z" level=info msg="Starting daemon with containerd snapshotter integration enabled" +time="2025-12-26T13:12:36.746236880Z" level=info msg="Restoring containers: start." +time="2025-12-26T13:12:36.757742895Z" level=info msg="Deleting nftables IPv4 rules" error="exec: \"nft\": executable file not found in $PATH" +time="2025-12-26T13:12:36.757766237Z" level=info msg="Deleting nftables IPv6 rules" error="exec: \"nft\": executable file not found in $PATH" +time="2025-12-26T13:12:36.947985615Z" level=info msg="Loading containers: done." +time="2025-12-26T13:12:36.952727549Z" level=warning msg="[DEPRECATION NOTICE]: API is accessible on http://0.0.0.0:2375 without encryption.\n Access to the remote API is equivalent to root access on the host. Refer\n to the 'Docker daemon attack surface' section in the documentation for\n more information: https://docs.docker.com/go/attack-surface/\nIn future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" +time="2025-12-26T13:12:36.952745839Z" level=info msg="Docker daemon" commit=fbf3ed2 containerd-snapshotter=true storage-driver=overlayfs version=29.1.3 +time="2025-12-26T13:12:36.952799028Z" level=info msg="Initializing buildkit" +time="2025-12-26T13:12:37.022912976Z" level=info msg="Completed buildkit initialization" +time="2025-12-26T13:12:37.025103241Z" level=info msg="Daemon has completed initialization" +time="2025-12-26T13:12:37.025175858Z" level=info msg="API listen on /var/run/docker.sock" +time="2025-12-26T13:12:37.025188808Z" level=info msg="API listen on [::]:2375" +time="2025-12-26T13:12:41.193081246Z" level=info msg="image pulled" digest="sha256:049c6ec3dad73daa72a97d8031862bb66cd07ae65db661c82b9a739cdc3fc294" remote="ghcr.io/kevinveenbirkenbach/alpine-rsync:latest" +time="2025-12-26T13:12:45.126313735Z" level=info msg="image pulled" digest="sha256:765942a4039992336de8dd5db680586e1a206607dd06170ff0a37267a9e01958" remote="docker.io/library/alpine:3.20" +time="2025-12-26T13:12:50.299948198Z" level=info msg="connecting to shim 972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1" address="unix:///run/containerd/s/fc3ad1eeddab1ec96fdb9926086343c235f3e670360186e882cc05677fe69f38" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T13:12:50.412014169Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T13:12:50.430354220Z" level=info msg="sbJoin: gwep4 ''->'7d5c918912ea', gwep6 ''->''" eid=7d5c918912ea ep=zen_northcutt net=bridge nid=273bd12dbccf +time="2025-12-26T13:12:50.488045137Z" level=info msg="ignoring event" container=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" +time="2025-12-26T13:12:50.488095870Z" level=info msg="shim disconnected" id=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 namespace=moby +time="2025-12-26T13:12:50.488117693Z" level=info msg="cleaning up after shim disconnected" id=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 namespace=moby +time="2025-12-26T13:12:50.488122051Z" level=info msg="cleaning up dead shim" id=972154cc8d0901f81a054f0e5e3ddc210b2b0708d9676d0f3ec509318798c6a1 namespace=moby +time="2025-12-26T13:12:51.324794894Z" level=info msg="connecting to shim 6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334" address="unix:///run/containerd/s/90adb363b22d54ffc63ff01f8efbb54e3c6b6211b7d5f79e0a196bd74836f1f1" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T13:12:51.415903351Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T13:12:51.432443828Z" level=info msg="sbJoin: gwep4 ''->'bc84305bbcdd', gwep6 ''->''" eid=bc84305bbcdd ep=frosty_booth net=bridge nid=273bd12dbccf +time="2025-12-26T13:12:51.491912087Z" level=info msg="shim disconnected" id=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 namespace=moby +time="2025-12-26T13:12:51.491933510Z" level=info msg="cleaning up after shim disconnected" id=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 namespace=moby +time="2025-12-26T13:12:51.491939839Z" level=info msg="cleaning up dead shim" id=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 namespace=moby +time="2025-12-26T13:12:51.492007924Z" level=info msg="ignoring event" container=6603444bf2ed97d313096c400af3d5c8e925db35486e3ae3964592de58753334 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" +time="2025-12-26T13:13:13.522436498Z" level=info msg="image pulled" digest="sha256:1cac8492bd78b1ec693238dc600be173397efd7b55eabc725abc281dc855b482" remote="docker.io/library/mariadb:11" +time="2025-12-26T13:13:13.949236937Z" level=info msg="connecting to shim c5ac9491eae276c22025f00be6c4fbfae3eb0d5a93169abac4f33361504c037b" address="unix:///run/containerd/s/9630f7225dc2a2122064ccc65f2f0087cdfb4109efa46c6bcfd990ede6ea19ce" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T13:13:14.054875143Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T13:13:14.071547528Z" level=info msg="sbJoin: gwep4 ''->'597a400c9b0e', gwep6 ''->''" eid=597a400c9b0e ep=baudolo-e2e-mariadb-full-0790ca5d41-mariadb net=bridge nid=273bd12dbccf +time="2025-12-26T13:13:23.286724224Z" level=info msg="connecting to shim 0b87b8fdc76bf726013d2d1d6cca85d8e9cb5b7a958367a2b793cbcbec5a9d2f" address="unix:///run/containerd/s/f8d1041b5d1ed7817faf358db9bb1b596840a75c0604a14f8b36b3677e3d9bf2" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T13:13:23.388684715Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T13:13:23.411947042Z" level=info msg="sbJoin: gwep4 ''->'8253bf043b58', gwep6 ''->''" eid=8253bf043b58 ep=baudolo-e2e-mariadb-nocopy-fbea8e4fa3-mariadb net=bridge nid=273bd12dbccf +time="2025-12-26T13:14:00.542854374Z" level=info msg="image pulled" digest="sha256:d4c3314b2dd74ff23cd6cd07e4d7e737cb6ef791c22a7cbd744cfbfb4815df72" remote="docker.io/library/postgres:16" +time="2025-12-26T13:14:00.901578914Z" level=info msg="connecting to shim 875008fe1e9e58e18eed4d14e13feeba1424ebcace789a038abc308df88b8a3f" address="unix:///run/containerd/s/afbe754b0641b7b82689d5d935c09c3911c999580a8cd466eef5cd345d218376" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T13:14:01.016704015Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T13:14:01.040324806Z" level=info msg="sbJoin: gwep4 ''->'5a2f1953c3f0', gwep6 ''->''" eid=5a2f1953c3f0 ep=baudolo-e2e-postgres-full-e9784b8d4b-pg net=bridge nid=273bd12dbccf +time="2025-12-26T13:14:03.968249238Z" level=info msg="connecting to shim 18ef5793cfc5ea0e4c4d95344b5c3589d9e679c120b9ff142a59e9de880d5702" address="unix:///run/containerd/s/a03b9519bbae0d99bb4256cfda3177c795e58ac0c5f85c23f75a9b029bbf9fa5" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T13:14:04.076486784Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T13:14:04.092748669Z" level=info msg="sbJoin: gwep4 ''->'8b1d894976ab', gwep6 ''->''" eid=8b1d894976ab ep=baudolo-e2e-postgres-nocopy-15d1e23327-pg net=bridge nid=273bd12dbccf diff --git a/artifacts/dind-logs-20251226180030.txt b/artifacts/dind-logs-20251226180030.txt new file mode 100644 index 0000000..9b5342f --- /dev/null +++ b/artifacts/dind-logs-20251226180030.txt @@ -0,0 +1,113 @@ +cat: can't open '/proc/net/ip6_tables_names': No such file or directory +cat: can't open '/proc/net/arp_tables_names': No such file or directory +iptables v1.8.11 (nf_tables) +time="2025-12-26T17:00:30.670240834Z" level=info msg="Starting up" +time="2025-12-26T17:00:30.670483375Z" level=warning msg="Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network." host="tcp://0.0.0.0:2375" +time="2025-12-26T17:00:30.670490199Z" level=warning msg="Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!" host="tcp://0.0.0.0:2375" +time="2025-12-26T17:00:30.670493463Z" level=warning msg="[DEPRECATION NOTICE] In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" host="tcp://0.0.0.0:2375" +time="2025-12-26T17:00:31.671142252Z" level=info msg="containerd not running, starting managed containerd" +time="2025-12-26T17:00:31.671816629Z" level=info msg="started new containerd process" address=/var/run/docker/containerd/containerd.sock module=libcontainerd pid=38 +time="2025-12-26T17:00:31.679174629Z" level=info msg="starting containerd" revision=1c4457e00facac03ce1d75f7b6777a7a851e5c41 version=v2.2.0 +time="2025-12-26T17:00:31.686162725Z" level=warning msg="Configuration migrated from version 2, use `containerd config migrate` to avoid migration" t="3.13µs" +time="2025-12-26T17:00:31.686190065Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1 +time="2025-12-26T17:00:31.686235899Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1 +time="2025-12-26T17:00:31.686250875Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1 +time="2025-12-26T17:00:31.686450438Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1 +time="2025-12-26T17:00:31.686467644Z" level=info msg="loading plugin" id=io.containerd.mount-handler.v1.erofs type=io.containerd.mount-handler.v1 +time="2025-12-26T17:00:31.686479124Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686532605Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686544650Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686555001Z" level=info msg="skip loading plugin" error="devmapper not configured: skip plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686562710Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686697989Z" level=info msg="skip loading plugin" error="EROFS unsupported, please `modprobe erofs`: skip plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686709462Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686769573Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686909801Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686945246Z" level=info msg="skip loading plugin" error="lstat /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs: no such file or directory: skip plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:00:31.686956789Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1 +time="2025-12-26T17:00:31.686981832Z" level=info msg="loading plugin" id=io.containerd.monitor.task.v1.cgroups type=io.containerd.monitor.task.v1 +time="2025-12-26T17:00:31.687563537Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1 +time="2025-12-26T17:00:31.687705806Z" level=info msg="metadata content store policy set" policy=shared +time="2025-12-26T17:00:31.720537850Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1 +time="2025-12-26T17:00:31.720581316Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1 +time="2025-12-26T17:00:31.720628516Z" level=info msg="built-in NRI default validator is disabled" +time="2025-12-26T17:00:31.720631468Z" level=info msg="runtime interface created" +time="2025-12-26T17:00:31.720633477Z" level=info msg="created NRI interface" +time="2025-12-26T17:00:31.720637569Z" level=info msg="loading plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 +time="2025-12-26T17:00:31.720688284Z" level=info msg="skip loading plugin" error="failed to check mkfs.erofs availability: failed to run mkfs.erofs --help: exec: \"mkfs.erofs\": executable file not found in $PATH: skip plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 +time="2025-12-26T17:00:31.720694077Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1 +time="2025-12-26T17:00:31.720700483Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1 +time="2025-12-26T17:00:31.720705680Z" level=info msg="loading plugin" id=io.containerd.mount-manager.v1.bolt type=io.containerd.mount-manager.v1 +time="2025-12-26T17:00:31.730341558Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730376426Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730387303Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730398550Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730409225Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730418716Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730426969Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730439790Z" level=info msg="loading plugin" id=io.containerd.shim.v1.manager type=io.containerd.shim.v1 +time="2025-12-26T17:00:31.730453240Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2 +time="2025-12-26T17:00:31.730595974Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1 +time="2025-12-26T17:00:31.730613653Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730624484Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730632974Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730641870Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730649677Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730658962Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730668771Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730678507Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.mounts type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730686143Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.730706862Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1 +time="2025-12-26T17:00:31.730722989Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1 +time="2025-12-26T17:00:31.730751288Z" level=info msg="loading plugin" id=io.containerd.cri.v1.images type=io.containerd.cri.v1 +time="2025-12-26T17:00:31.730857584Z" level=info msg="Get image filesystem path \"/var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\"" +time="2025-12-26T17:00:31.730877944Z" level=info msg="Start snapshots syncer" +time="2025-12-26T17:00:31.730894454Z" level=info msg="loading plugin" id=io.containerd.cri.v1.runtime type=io.containerd.cri.v1 +time="2025-12-26T17:00:31.731070610Z" level=info msg="starting cri plugin" config="{\"containerd\":{\"defaultRuntimeName\":\"runc\",\"runtimes\":{\"runc\":{\"runtimeType\":\"io.containerd.runc.v2\",\"runtimePath\":\"\",\"PodAnnotations\":null,\"ContainerAnnotations\":null,\"options\":{\"BinaryName\":\"\",\"CriuImagePath\":\"\",\"CriuWorkPath\":\"\",\"IoGid\":0,\"IoUid\":0,\"NoNewKeyring\":false,\"Root\":\"\",\"ShimCgroup\":\"\",\"SystemdCgroup\":false},\"privileged_without_host_devices\":false,\"privileged_without_host_devices_all_devices_allowed\":false,\"cgroupWritable\":false,\"baseRuntimeSpec\":\"\",\"cniConfDir\":\"\",\"cniMaxConfNum\":0,\"snapshotter\":\"\",\"sandboxer\":\"podsandbox\",\"io_type\":\"\"}},\"ignoreBlockIONotEnabledErrors\":false,\"ignoreRdtNotEnabledErrors\":false},\"cni\":{\"binDir\":\"\",\"binDirs\":[\"/opt/cni/bin\"],\"confDir\":\"/etc/cni/net.d\",\"maxConfNum\":1,\"setupSerially\":false,\"confTemplate\":\"\",\"ipPref\":\"\",\"useInternalLoopback\":false},\"enableSelinux\":false,\"selinuxCategoryRange\":1024,\"maxContainerLogLineSize\":16384,\"disableApparmor\":false,\"restrictOOMScoreAdj\":false,\"disableProcMount\":false,\"unsetSeccompProfile\":\"\",\"tolerateMissingHugetlbController\":true,\"disableHugetlbController\":true,\"device_ownership_from_security_context\":false,\"ignoreImageDefinedVolumes\":false,\"netnsMountsUnderStateDir\":false,\"enableUnprivilegedPorts\":true,\"enableUnprivilegedICMP\":true,\"enableCDI\":true,\"cdiSpecDirs\":[\"/etc/cdi\",\"/var/run/cdi\"],\"drainExecSyncIOTimeout\":\"0s\",\"ignoreDeprecationWarnings\":null,\"containerdRootDir\":\"/var/lib/docker/containerd/daemon\",\"containerdEndpoint\":\"/var/run/docker/containerd/containerd.sock\",\"rootDir\":\"/var/lib/docker/containerd/daemon/io.containerd.grpc.v1.cri\",\"stateDir\":\"/var/run/docker/containerd/daemon/io.containerd.grpc.v1.cri\"}" +time="2025-12-26T17:00:31.731102405Z" level=info msg="loading plugin" id=io.containerd.podsandbox.controller.v1.podsandbox type=io.containerd.podsandbox.controller.v1 +time="2025-12-26T17:00:31.731128197Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1 +time="2025-12-26T17:00:31.731193031Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731200982Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731205777Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731209980Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1 +time="2025-12-26T17:00:31.731214824Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731219248Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731223844Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731232946Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731239826Z" level=info msg="loading plugin" id=io.containerd.monitor.container.v1.restart type=io.containerd.monitor.container.v1 +time="2025-12-26T17:00:31.731255852Z" level=info msg="loading plugin" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 +time="2025-12-26T17:00:31.731263836Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 +time="2025-12-26T17:00:31.731267707Z" level=info msg="loading plugin" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 +time="2025-12-26T17:00:31.731271783Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 +time="2025-12-26T17:00:31.731275100Z" level=info msg="loading plugin" id=io.containerd.ttrpc.v1.otelttrpc type=io.containerd.ttrpc.v1 +time="2025-12-26T17:00:31.731280016Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1 +time="2025-12-26T17:00:31.731448393Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock +time="2025-12-26T17:00:31.731473806Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock.ttrpc +time="2025-12-26T17:00:31.731492732Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock +time="2025-12-26T17:00:31.731503174Z" level=info msg="containerd successfully booted in 0.052761s" +time="2025-12-26T17:00:31.734685579Z" level=info msg="OTEL tracing is not configured, using no-op tracer provider" +time="2025-12-26T17:00:31.734799553Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/etc/cdi +time="2025-12-26T17:00:31.734812727Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/var/run/cdi +time="2025-12-26T17:00:31.741342450Z" level=info msg="Creating a containerd client" address=/var/run/docker/containerd/containerd.sock timeout=1m0s +time="2025-12-26T17:00:31.789810808Z" level=info msg="Loading containers: start." +time="2025-12-26T17:00:31.789841146Z" level=info msg="Starting daemon with containerd snapshotter integration enabled" +time="2025-12-26T17:00:31.790944984Z" level=info msg="Restoring containers: start." +time="2025-12-26T17:00:31.801003706Z" level=info msg="Deleting nftables IPv4 rules" error="exec: \"nft\": executable file not found in $PATH" +time="2025-12-26T17:00:31.801024443Z" level=info msg="Deleting nftables IPv6 rules" error="exec: \"nft\": executable file not found in $PATH" +time="2025-12-26T17:00:31.991621063Z" level=info msg="Loading containers: done." +time="2025-12-26T17:00:31.996631011Z" level=warning msg="[DEPRECATION NOTICE]: API is accessible on http://0.0.0.0:2375 without encryption.\n Access to the remote API is equivalent to root access on the host. Refer\n to the 'Docker daemon attack surface' section in the documentation for\n more information: https://docs.docker.com/go/attack-surface/\nIn future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" +time="2025-12-26T17:00:31.996653056Z" level=info msg="Docker daemon" commit=fbf3ed2 containerd-snapshotter=true storage-driver=overlayfs version=29.1.3 +time="2025-12-26T17:00:31.996710585Z" level=info msg="Initializing buildkit" +time="2025-12-26T17:00:32.069603995Z" level=info msg="Completed buildkit initialization" +time="2025-12-26T17:00:32.072710025Z" level=info msg="Daemon has completed initialization" +time="2025-12-26T17:00:32.072752238Z" level=info msg="API listen on /var/run/docker.sock" +time="2025-12-26T17:00:32.072773881Z" level=info msg="API listen on [::]:2375" +time="2025-12-26T17:00:43.099851916Z" level=info msg="image pulled" digest="sha256:049c6ec3dad73daa72a97d8031862bb66cd07ae65db661c82b9a739cdc3fc294" remote="ghcr.io/kevinveenbirkenbach/alpine-rsync:latest" +time="2025-12-26T17:00:48.227195916Z" level=info msg="image pulled" digest="sha256:765942a4039992336de8dd5db680586e1a206607dd06170ff0a37267a9e01958" remote="docker.io/library/alpine:3.20" +time="2025-12-26T17:00:53.300823343Z" level=info msg="connecting to shim debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45" address="unix:///run/containerd/s/bc05889af75cafd69995a5da4eaac21a9b7480650f37b4ce1d06f41d828d889e" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T17:00:53.401038895Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T17:00:53.418527896Z" level=info msg="sbJoin: gwep4 ''->'bbecf7c52919', gwep6 ''->''" eid=bbecf7c52919 ep=elated_snyder net=bridge nid=43f0f11bd281 +time="2025-12-26T17:00:53.475799953Z" level=info msg="shim disconnected" id=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 namespace=moby +time="2025-12-26T17:00:53.475826135Z" level=info msg="cleaning up after shim disconnected" id=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 namespace=moby +time="2025-12-26T17:00:53.475834014Z" level=info msg="cleaning up dead shim" id=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 namespace=moby +time="2025-12-26T17:00:53.475840126Z" level=info msg="ignoring event" container=debae25e9efdf3852a3a80174d33276bc78d40964c126972a2d9baa6fc637b45 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" diff --git a/artifacts/dind-logs-20251226180450.txt b/artifacts/dind-logs-20251226180450.txt new file mode 100644 index 0000000..b0daca0 --- /dev/null +++ b/artifacts/dind-logs-20251226180450.txt @@ -0,0 +1,113 @@ +cat: can't open '/proc/net/ip6_tables_names': No such file or directory +cat: can't open '/proc/net/arp_tables_names': No such file or directory +iptables v1.8.11 (nf_tables) +time="2025-12-26T17:04:50.613107807Z" level=info msg="Starting up" +time="2025-12-26T17:04:50.613339353Z" level=warning msg="Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network." host="tcp://0.0.0.0:2375" +time="2025-12-26T17:04:50.613346861Z" level=warning msg="Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!" host="tcp://0.0.0.0:2375" +time="2025-12-26T17:04:50.613349917Z" level=warning msg="[DEPRECATION NOTICE] In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" host="tcp://0.0.0.0:2375" +time="2025-12-26T17:04:51.613771872Z" level=info msg="containerd not running, starting managed containerd" +time="2025-12-26T17:04:51.614652534Z" level=info msg="started new containerd process" address=/var/run/docker/containerd/containerd.sock module=libcontainerd pid=38 +time="2025-12-26T17:04:51.622815401Z" level=info msg="starting containerd" revision=1c4457e00facac03ce1d75f7b6777a7a851e5c41 version=v2.2.0 +time="2025-12-26T17:04:51.627029971Z" level=warning msg="Configuration migrated from version 2, use `containerd config migrate` to avoid migration" t="1.695µs" +time="2025-12-26T17:04:51.627048536Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1 +time="2025-12-26T17:04:51.627067091Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1 +time="2025-12-26T17:04:51.627071644Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1 +time="2025-12-26T17:04:51.627157330Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1 +time="2025-12-26T17:04:51.627162094Z" level=info msg="loading plugin" id=io.containerd.mount-handler.v1.erofs type=io.containerd.mount-handler.v1 +time="2025-12-26T17:04:51.627168687Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627186430Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627190221Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627194071Z" level=info msg="skip loading plugin" error="devmapper not configured: skip plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627197321Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627263105Z" level=info msg="skip loading plugin" error="EROFS unsupported, please `modprobe erofs`: skip plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627267252Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627289297Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627351514Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627366412Z" level=info msg="skip loading plugin" error="lstat /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs: no such file or directory: skip plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 +time="2025-12-26T17:04:51.627370505Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1 +time="2025-12-26T17:04:51.627384024Z" level=info msg="loading plugin" id=io.containerd.monitor.task.v1.cgroups type=io.containerd.monitor.task.v1 +time="2025-12-26T17:04:51.627567625Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1 +time="2025-12-26T17:04:51.627694627Z" level=info msg="metadata content store policy set" policy=shared +time="2025-12-26T17:04:51.671110562Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1 +time="2025-12-26T17:04:51.671180400Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1 +time="2025-12-26T17:04:51.671214347Z" level=info msg="built-in NRI default validator is disabled" +time="2025-12-26T17:04:51.671233509Z" level=info msg="runtime interface created" +time="2025-12-26T17:04:51.671237604Z" level=info msg="created NRI interface" +time="2025-12-26T17:04:51.671243623Z" level=info msg="loading plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 +time="2025-12-26T17:04:51.671341286Z" level=info msg="skip loading plugin" error="failed to check mkfs.erofs availability: failed to run mkfs.erofs --help: exec: \"mkfs.erofs\": executable file not found in $PATH: skip plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 +time="2025-12-26T17:04:51.671353665Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1 +time="2025-12-26T17:04:51.671363925Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1 +time="2025-12-26T17:04:51.671371889Z" level=info msg="loading plugin" id=io.containerd.mount-manager.v1.bolt type=io.containerd.mount-manager.v1 +time="2025-12-26T17:04:51.682298424Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682322472Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682333398Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682341979Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682350038Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682357562Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682373750Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682381707Z" level=info msg="loading plugin" id=io.containerd.shim.v1.manager type=io.containerd.shim.v1 +time="2025-12-26T17:04:51.682391080Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2 +time="2025-12-26T17:04:51.682525041Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1 +time="2025-12-26T17:04:51.682541064Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682550397Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682557457Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682565722Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682572929Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682580571Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682587529Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682595171Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.mounts type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682601599Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.682610883Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1 +time="2025-12-26T17:04:51.682621078Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1 +time="2025-12-26T17:04:51.682644046Z" level=info msg="loading plugin" id=io.containerd.cri.v1.images type=io.containerd.cri.v1 +time="2025-12-26T17:04:51.682674205Z" level=info msg="Get image filesystem path \"/var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\"" +time="2025-12-26T17:04:51.682683653Z" level=info msg="Start snapshots syncer" +time="2025-12-26T17:04:51.682701064Z" level=info msg="loading plugin" id=io.containerd.cri.v1.runtime type=io.containerd.cri.v1 +time="2025-12-26T17:04:51.682882056Z" level=info msg="starting cri plugin" config="{\"containerd\":{\"defaultRuntimeName\":\"runc\",\"runtimes\":{\"runc\":{\"runtimeType\":\"io.containerd.runc.v2\",\"runtimePath\":\"\",\"PodAnnotations\":null,\"ContainerAnnotations\":null,\"options\":{\"BinaryName\":\"\",\"CriuImagePath\":\"\",\"CriuWorkPath\":\"\",\"IoGid\":0,\"IoUid\":0,\"NoNewKeyring\":false,\"Root\":\"\",\"ShimCgroup\":\"\",\"SystemdCgroup\":false},\"privileged_without_host_devices\":false,\"privileged_without_host_devices_all_devices_allowed\":false,\"cgroupWritable\":false,\"baseRuntimeSpec\":\"\",\"cniConfDir\":\"\",\"cniMaxConfNum\":0,\"snapshotter\":\"\",\"sandboxer\":\"podsandbox\",\"io_type\":\"\"}},\"ignoreBlockIONotEnabledErrors\":false,\"ignoreRdtNotEnabledErrors\":false},\"cni\":{\"binDir\":\"\",\"binDirs\":[\"/opt/cni/bin\"],\"confDir\":\"/etc/cni/net.d\",\"maxConfNum\":1,\"setupSerially\":false,\"confTemplate\":\"\",\"ipPref\":\"\",\"useInternalLoopback\":false},\"enableSelinux\":false,\"selinuxCategoryRange\":1024,\"maxContainerLogLineSize\":16384,\"disableApparmor\":false,\"restrictOOMScoreAdj\":false,\"disableProcMount\":false,\"unsetSeccompProfile\":\"\",\"tolerateMissingHugetlbController\":true,\"disableHugetlbController\":true,\"device_ownership_from_security_context\":false,\"ignoreImageDefinedVolumes\":false,\"netnsMountsUnderStateDir\":false,\"enableUnprivilegedPorts\":true,\"enableUnprivilegedICMP\":true,\"enableCDI\":true,\"cdiSpecDirs\":[\"/etc/cdi\",\"/var/run/cdi\"],\"drainExecSyncIOTimeout\":\"0s\",\"ignoreDeprecationWarnings\":null,\"containerdRootDir\":\"/var/lib/docker/containerd/daemon\",\"containerdEndpoint\":\"/var/run/docker/containerd/containerd.sock\",\"rootDir\":\"/var/lib/docker/containerd/daemon/io.containerd.grpc.v1.cri\",\"stateDir\":\"/var/run/docker/containerd/daemon/io.containerd.grpc.v1.cri\"}" +time="2025-12-26T17:04:51.682925497Z" level=info msg="loading plugin" id=io.containerd.podsandbox.controller.v1.podsandbox type=io.containerd.podsandbox.controller.v1 +time="2025-12-26T17:04:51.682973419Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1 +time="2025-12-26T17:04:51.683071161Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683095568Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683108804Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683116807Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1 +time="2025-12-26T17:04:51.683124837Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683134026Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683141550Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683150586Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683157413Z" level=info msg="loading plugin" id=io.containerd.monitor.container.v1.restart type=io.containerd.monitor.container.v1 +time="2025-12-26T17:04:51.683181945Z" level=info msg="loading plugin" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 +time="2025-12-26T17:04:51.683191987Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 +time="2025-12-26T17:04:51.683198479Z" level=info msg="loading plugin" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 +time="2025-12-26T17:04:51.683205005Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 +time="2025-12-26T17:04:51.683210667Z" level=info msg="loading plugin" id=io.containerd.ttrpc.v1.otelttrpc type=io.containerd.ttrpc.v1 +time="2025-12-26T17:04:51.683217137Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1 +time="2025-12-26T17:04:51.683382334Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock +time="2025-12-26T17:04:51.683440740Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock.ttrpc +time="2025-12-26T17:04:51.683482395Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock +time="2025-12-26T17:04:51.683496332Z" level=info msg="containerd successfully booted in 0.061180s" +time="2025-12-26T17:04:51.689868310Z" level=info msg="OTEL tracing is not configured, using no-op tracer provider" +time="2025-12-26T17:04:51.689928240Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/etc/cdi +time="2025-12-26T17:04:51.689933180Z" level=info msg="CDI directory does not exist, skipping: failed to monitor for changes: no such file or directory" dir=/var/run/cdi +time="2025-12-26T17:04:51.696060714Z" level=info msg="Creating a containerd client" address=/var/run/docker/containerd/containerd.sock timeout=1m0s +time="2025-12-26T17:04:51.748026436Z" level=info msg="Loading containers: start." +time="2025-12-26T17:04:51.748060954Z" level=info msg="Starting daemon with containerd snapshotter integration enabled" +time="2025-12-26T17:04:51.749558601Z" level=info msg="Restoring containers: start." +time="2025-12-26T17:04:51.759819367Z" level=info msg="Deleting nftables IPv4 rules" error="exec: \"nft\": executable file not found in $PATH" +time="2025-12-26T17:04:51.759838278Z" level=info msg="Deleting nftables IPv6 rules" error="exec: \"nft\": executable file not found in $PATH" +time="2025-12-26T17:04:51.947199035Z" level=info msg="Loading containers: done." +time="2025-12-26T17:04:51.952524862Z" level=warning msg="[DEPRECATION NOTICE]: API is accessible on http://0.0.0.0:2375 without encryption.\n Access to the remote API is equivalent to root access on the host. Refer\n to the 'Docker daemon attack surface' section in the documentation for\n more information: https://docs.docker.com/go/attack-surface/\nIn future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/" +time="2025-12-26T17:04:51.952549078Z" level=info msg="Docker daemon" commit=fbf3ed2 containerd-snapshotter=true storage-driver=overlayfs version=29.1.3 +time="2025-12-26T17:04:51.952629278Z" level=info msg="Initializing buildkit" +time="2025-12-26T17:04:52.020834951Z" level=info msg="Completed buildkit initialization" +time="2025-12-26T17:04:52.025499900Z" level=info msg="Daemon has completed initialization" +time="2025-12-26T17:04:52.025532980Z" level=info msg="API listen on /var/run/docker.sock" +time="2025-12-26T17:04:52.025551717Z" level=info msg="API listen on [::]:2375" +time="2025-12-26T17:04:57.724576270Z" level=info msg="image pulled" digest="sha256:049c6ec3dad73daa72a97d8031862bb66cd07ae65db661c82b9a739cdc3fc294" remote="ghcr.io/kevinveenbirkenbach/alpine-rsync:latest" +time="2025-12-26T17:05:02.767455556Z" level=info msg="image pulled" digest="sha256:765942a4039992336de8dd5db680586e1a206607dd06170ff0a37267a9e01958" remote="docker.io/library/alpine:3.20" +time="2025-12-26T17:05:07.941089635Z" level=info msg="connecting to shim f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f" address="unix:///run/containerd/s/d8dd997d64f10682ec22cc749e044ca9c730cb6f71bde41ab934c21fba8c11da" namespace=moby protocol=ttrpc version=3 +time="2025-12-26T17:05:08.050665605Z" level=info msg="No non-localhost DNS nameservers are left in resolv.conf. Using default external servers" +time="2025-12-26T17:05:08.067292062Z" level=info msg="sbJoin: gwep4 ''->'ce9a9cdb2d56', gwep6 ''->''" eid=ce9a9cdb2d56 ep=eloquent_solomon net=bridge nid=f9303d265b7c +time="2025-12-26T17:05:08.122943760Z" level=info msg="ignoring event" container=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" +time="2025-12-26T17:05:08.123007623Z" level=info msg="shim disconnected" id=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f namespace=moby +time="2025-12-26T17:05:08.123023007Z" level=info msg="cleaning up after shim disconnected" id=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f namespace=moby +time="2025-12-26T17:05:08.123026335Z" level=info msg="cleaning up dead shim" id=f606f132edfe329a81b3ec57a35a707f957409c387c10e7b8e78f984cbbef72f namespace=moby diff --git a/artifacts/e2e-tmp-20251226141235.tar.gz b/artifacts/e2e-tmp-20251226141235.tar.gz new file mode 100644 index 0000000..f300182 Binary files /dev/null and b/artifacts/e2e-tmp-20251226141235.tar.gz differ diff --git a/artifacts/e2e-tmp-20251226180030.tar.gz b/artifacts/e2e-tmp-20251226180030.tar.gz new file mode 100644 index 0000000..f300182 Binary files /dev/null and b/artifacts/e2e-tmp-20251226180030.tar.gz differ diff --git a/artifacts/e2e-tmp-20251226180450.tar.gz b/artifacts/e2e-tmp-20251226180450.tar.gz new file mode 100644 index 0000000..f300182 Binary files /dev/null and b/artifacts/e2e-tmp-20251226180450.tar.gz differ diff --git a/backup-docker-to-local.py b/backup-docker-to-local.py deleted file mode 100644 index 70b7faf..0000000 --- a/backup-docker-to-local.py +++ /dev/null @@ -1,382 +0,0 @@ -#!/bin/python -# Backups volumes of running containers - -import subprocess -import os -import re -import pathlib -import pandas -from datetime import datetime -import argparse - -class BackupException(Exception): - """Generic exception for backup errors.""" - pass - -def execute_shell_command(command): - """Execute a shell command and return its output.""" - print(command) - process = subprocess.Popen( - [command], - stdout=subprocess.PIPE, - stderr=subprocess.PIPE, - shell=True - ) - out, err = process.communicate() - if process.returncode != 0: - raise BackupException( - f"Error in command: {command}\n" - f"Output: {out}\nError: {err}\n" - f"Exit code: {process.returncode}" - ) - return [line.decode("utf-8") for line in out.splitlines()] - -def create_version_directory(): - """Create necessary directories for backup.""" - version_dir = os.path.join(VERSIONS_DIR, BACKUP_TIME) - pathlib.Path(version_dir).mkdir(parents=True, exist_ok=True) - return version_dir - -def get_machine_id(): - """Get the machine identifier.""" - return execute_shell_command("sha256sum /etc/machine-id")[0][0:64] - -### GLOBAL CONFIGURATION ### - -# Container names treated as special instances for database backups -DATABASE_CONTAINERS = ['central-mariadb', 'central-postgres'] - -# Images which do not require container stop for file backups -IMAGES_NO_STOP_REQUIRED = [] - -# Images to skip entirely -IMAGES_NO_BACKUP_REQUIRED = [] - -# Compose dirs requiring hard restart -DOCKER_COMPOSE_HARD_RESTART_REQUIRED = ['mailu'] - -# DEFINE CONSTANTS -DIRNAME = os.path.dirname(__file__) -SCRIPTS_DIRECTORY = pathlib.Path(os.path.realpath(__file__)).parent.parent -DATABASES = pandas.read_csv(os.path.join(DIRNAME, "databases.csv"), sep=";") -REPOSITORY_NAME = os.path.basename(DIRNAME) -MACHINE_ID = get_machine_id() -BACKUPS_DIR = '/Backups/' -VERSIONS_DIR = os.path.join(BACKUPS_DIR, MACHINE_ID, REPOSITORY_NAME) -BACKUP_TIME = datetime.now().strftime("%Y%m%d%H%M%S") -VERSION_DIR = create_version_directory() - -def get_instance(container): - """Extract the database instance name based on container name.""" - if container in DATABASE_CONTAINERS: - instance_name = container - else: - instance_name = re.split("(_|-)(database|db|postgres)", container)[0] - print(f"Extracted instance name: {instance_name}") - return instance_name - -def stamp_directory(): - """Stamp a directory using directory-validator.""" - stamp_command = f"dirval {VERSION_DIR} --stamp" - try: - execute_shell_command(stamp_command) - print(f"Successfully stamped directory: {VERSION_DIR}") - except BackupException as e: - print(f"Error running 'dirval' for {VERSION_DIR}: {e}") - exit(1) - -def backup_database(container, volume_dir, db_type): - """Backup database (MariaDB or PostgreSQL) if applicable.""" - print(f"Starting database backup for {container} using {db_type}...") - instance_name = get_instance(container) - database_entries = DATABASES.loc[DATABASES['instance'] == instance_name] - if database_entries.empty: - raise BackupException(f"No entry found for instance '{instance_name}'") - for database_entry in database_entries.iloc: - database_name = database_entry['database'] - database_username = database_entry['username'] - database_password = database_entry['password'] - backup_destination_dir = os.path.join(volume_dir, "sql") - pathlib.Path(backup_destination_dir).mkdir(parents=True, exist_ok=True) - backup_destination_file = os.path.join( - backup_destination_dir, - f"{database_name}.backup.sql" - ) - if db_type == 'mariadb': - cmd = ( - f"docker exec {container} " - f"/usr/bin/mariadb-dump -u {database_username} " - f"-p{database_password} {database_name} > {backup_destination_file}" - ) - execute_shell_command(cmd) - if db_type == 'postgres': - cluster_file = os.path.join( - backup_destination_dir, - f"{instance_name}.cluster.backup.sql" - ) - if not database_name: - fallback_pg_dumpall( - container, - database_username, - database_password, - cluster_file - ) - return - try: - if database_password: - cmd = ( - f"PGPASSWORD={database_password} docker exec -i {container} " - f"pg_dump -U {database_username} -d {database_name} " - f"-h localhost > {backup_destination_file}" - ) - else: - cmd = ( - f"docker exec -i {container} pg_dump -U {database_username} " - f"-d {database_name} -h localhost --no-password " - f"> {backup_destination_file}" - ) - execute_shell_command(cmd) - except BackupException as e: - print(f"pg_dump failed: {e}") - print(f"Falling back to pg_dumpall for instance '{instance_name}'") - fallback_pg_dumpall( - container, - database_username, - database_password, - cluster_file - ) - print(f"Database backup for database {container} completed.") - -def get_last_backup_dir(volume_name, current_backup_dir): - """Get the most recent backup directory for the specified volume.""" - versions = sorted(os.listdir(VERSIONS_DIR), reverse=True) - for version in versions: - backup_dir = os.path.join( - VERSIONS_DIR, version, volume_name, "files", "" - ) - if backup_dir != current_backup_dir and os.path.isdir(backup_dir): - return backup_dir - print(f"No previous backups available for volume: {volume_name}") - return None - -def getStoragePath(volume_name): - path = execute_shell_command( - f"docker volume inspect --format '{{{{ .Mountpoint }}}}' {volume_name}" - )[0] - return f"{path}/" - -def getFileRsyncDestinationPath(volume_dir): - path = os.path.join(volume_dir, "files") - return f"{path}/" - -def fallback_pg_dumpall(container, username, password, backup_destination_file): - """Fallback function to run pg_dumpall if pg_dump fails or no DB is defined.""" - print(f"Running pg_dumpall for container '{container}'...") - cmd = ( - f"PGPASSWORD={password} docker exec -i {container} " - f"pg_dumpall -U {username} -h localhost > {backup_destination_file}" - ) - execute_shell_command(cmd) - -def backup_volume(volume_name, volume_dir): - """Perform incremental file backup of a Docker volume.""" - try: - print(f"Starting backup routine for volume: {volume_name}") - dest = getFileRsyncDestinationPath(volume_dir) - pathlib.Path(dest).mkdir(parents=True, exist_ok=True) - last = get_last_backup_dir(volume_name, dest) - link_dest = f"--link-dest='{last}'" if last else "" - source = getStoragePath(volume_name) - cmd = ( - f"rsync -abP --delete --delete-excluded " - f"{link_dest} {source} {dest}" - ) - execute_shell_command(cmd) - except BackupException as e: - if "file has vanished" in str(e): - print("Warning: Some files vanished before transfer. Continuing.") - else: - raise - print(f"Backup routine for volume: {volume_name} completed.") - -def get_image_info(container): - return execute_shell_command( - f"docker inspect --format '{{{{.Config.Image}}}}' {container}" - ) - -def has_image(container, image): - """Check if the container is using the image""" - info = get_image_info(container)[0] - return image in info - -def change_containers_status(containers, status): - """Stop or start a list of containers.""" - if containers: - names = ' '.join(containers) - print(f"{status.capitalize()} containers: {names}...") - execute_shell_command(f"docker {status} {names}") - else: - print(f"No containers to {status}.") - -def is_image_whitelisted(container, images): - """ - Return True if the container's image matches any of the whitelist patterns. - Also prints out the image name and the match result. - """ - # fetch the image (e.g. "nextcloud:23-fpm-alpine") - info = get_image_info(container)[0] - - # check against each pattern - whitelisted = any(pattern in info for pattern in images) - - # log the result - print(f"Container {container!r} → image {info!r} → whitelisted? {whitelisted}", flush=True) - - return whitelisted - -def is_container_stop_required(containers): - """ - Check if any of the containers are using images that are not whitelisted. - If so, print them out and return True; otherwise return False. - """ - # Find all containers whose image isn’t on the whitelist - not_whitelisted = [ - c for c in containers - if not is_image_whitelisted(c, IMAGES_NO_STOP_REQUIRED) - ] - - if not_whitelisted: - print(f"Containers requiring stop because they are not whitelisted: {', '.join(not_whitelisted)}") - return True - - return False - -def create_volume_directory(volume_name): - """Create necessary directories for backup.""" - path = os.path.join(VERSION_DIR, volume_name) - pathlib.Path(path).mkdir(parents=True, exist_ok=True) - return path - -def is_image_ignored(container): - """Check if the container's image is one of the ignored images.""" - return any(has_image(container, img) for img in IMAGES_NO_BACKUP_REQUIRED) - -def backup_with_containers_paused(volume_name, volume_dir, containers, shutdown): - change_containers_status(containers, 'stop') - backup_volume(volume_name, volume_dir) - if not shutdown: - change_containers_status(containers, 'start') - -def backup_mariadb_or_postgres(container, volume_dir): - """Performs database image specific backup procedures""" - for img in ['mariadb', 'postgres']: - if has_image(container, img): - backup_database(container, volume_dir, img) - return True - return False - -def default_backup_routine_for_volume(volume_name, containers, shutdown): - """Perform backup routine for a given volume.""" - vol_dir = "" - for c in containers: - if is_image_ignored(c): - print(f"Ignoring volume '{volume_name}' linked to container '{c}'.") - continue - vol_dir = create_volume_directory(volume_name) - if backup_mariadb_or_postgres(c, vol_dir): - return - if vol_dir: - backup_volume(volume_name, vol_dir) - if is_container_stop_required(containers): - backup_with_containers_paused(volume_name, vol_dir, containers, shutdown) - -def backup_everything(volume_name, containers, shutdown): - """Perform file backup routine for a given volume.""" - vol_dir = create_volume_directory(volume_name) - for c in containers: - backup_mariadb_or_postgres(c, vol_dir) - backup_volume(volume_name, vol_dir) - backup_with_containers_paused(volume_name, vol_dir, containers, shutdown) - -def hard_restart_docker_services(dir_path): - """Perform a hard restart of docker-compose services in the given directory.""" - try: - print(f"Performing hard restart for docker-compose services in: {dir_path}") - subprocess.run(["docker-compose", "down"], cwd=dir_path, check=True) - subprocess.run(["docker-compose", "up", "-d"], cwd=dir_path, check=True) - print(f"Hard restart completed successfully in: {dir_path}") - except subprocess.CalledProcessError as e: - print(f"Error during hard restart in {dir_path}: {e}") - exit(2) - -def handle_docker_compose_services(parent_directory): - """Iterate through directories and restart or hard restart services as needed.""" - for entry in os.scandir(parent_directory): - if entry.is_dir(): - dir_path = entry.path - name = os.path.basename(dir_path) - print(f"Checking directory: {dir_path}") - compose_file = os.path.join(dir_path, "docker-compose.yml") - if os.path.isfile(compose_file): - print(f"Found docker-compose.yml in {dir_path}.") - if name in DOCKER_COMPOSE_HARD_RESTART_REQUIRED: - print(f"Directory {name} detected. Performing hard restart...") - hard_restart_docker_services(dir_path) - else: - print(f"No restart required for services in {dir_path}...") - else: - print(f"No docker-compose.yml found in {dir_path}. Skipping.") - -def main(): - global DATABASE_CONTAINERS, IMAGES_NO_STOP_REQUIRED - parser = argparse.ArgumentParser(description='Backup Docker volumes.') - parser.add_argument('--everything', action='store_true', - help='Force file backup for all volumes and additional execute database dumps') - parser.add_argument('--shutdown', action='store_true', - help='Doesn\'t restart containers after backup') - parser.add_argument('--compose-dir', type=str, required=True, - help='Path to the parent directory containing docker-compose setups') - parser.add_argument( - '--database-containers', - nargs='+', - required=True, - help='List of container names treated as special instances for database backups' - ) - parser.add_argument( - '--images-no-stop-required', - nargs='+', - required=True, - help='List of image names for which containers should not be stopped during file backup' - ) - parser.add_argument( - '--images-no-backup-required', - nargs='+', - help='List of image names for which no backup should be performed (optional)' - ) - args = parser.parse_args() - DATABASE_CONTAINERS = args.database_containers - IMAGES_NO_STOP_REQUIRED = args.images_no_stop_required - if args.images_no_backup_required is not None: - global IMAGES_NO_BACKUP_REQUIRED - IMAGES_NO_BACKUP_REQUIRED = args.images_no_backup_required - - print('💾 Start volume backups...', flush=True) - volume_names = execute_shell_command("docker volume ls --format '{{.Name}}'") - for volume_name in volume_names: - print(f'Start backup routine for volume: {volume_name}') - containers = execute_shell_command( - f"docker ps --filter volume=\"{volume_name}\" --format '{{{{.Names}}}}'" - ) - if args.everything: - backup_everything(volume_name, containers, args.shutdown) - else: - default_backup_routine_for_volume(volume_name, containers, args.shutdown) - - stamp_directory() - print('Finished volume backups.') - - print('Handling Docker Compose services...') - handle_docker_compose_services(args.compose_dir) - -if __name__ == "__main__": - main() diff --git a/databases.csv.tpl b/databases.csv.tpl deleted file mode 100644 index da3a77b..0000000 --- a/databases.csv.tpl +++ /dev/null @@ -1 +0,0 @@ -instance;database;username;password diff --git a/pyproject.toml b/pyproject.toml new file mode 100644 index 0000000..ac6434d --- /dev/null +++ b/pyproject.toml @@ -0,0 +1,29 @@ +[build-system] +requires = ["setuptools>=69", "wheel"] +build-backend = "setuptools.build_meta" + +[project] +name = "backup-docker-to-local" +version = "0.1.0" +description = "Backup Docker volumes to local with rsync and optional DB dumps." +readme = "README.md" +requires-python = ">=3.9" +license = { text = "AGPL-3.0-or-later" } +authors = [{ name = "Kevin Veen-Birkenbach" }] + +dependencies = [ + "pandas", + "dirval", +] + +[project.scripts] +baudolo = "baudolo.backup.__main__:main" +baudolo-restore = "baudolo.restore.__main__:main" +baudolo-configure = "baudolo.configure.__main__:main" + +[tool.setuptools] +package-dir = { "" = "src" } + +[tool.setuptools.packages.find] +where = ["src"] +exclude = ["tests*"] diff --git a/recover-docker-from-local.sh b/recover-docker-from-local.sh deleted file mode 100644 index d1e9299..0000000 --- a/recover-docker-from-local.sh +++ /dev/null @@ -1,85 +0,0 @@ -#!/bin/bash - -# Check minimum number of arguments -if [ $# -lt 3 ]; then - echo "ERROR: Not enough arguments. Please provide at least a volume name, backup hash, and version." - exit 1 -fi - -volume_name="$1" # Volume-Name -backup_hash="$2" # Hashed Machine ID -version="$3" # version to recover - -# DATABASE PARAMETERS -database_type="$4" # Valid values; mariadb, postgress -database_container="$5" # optional -database_password="$6" # optional -database_name="$7" # optional -database_user="$database_name" - - -backup_folder="Backups/$backup_hash/backup-docker-to-local/$version/$volume_name" -backup_files="/$backup_folder/files" -backup_sql="/$backup_folder/sql/$database_name.backup.sql" - -# DATABASE RECOVERY - -if [ ! -z "$database_type" ]; then - if [ "$database_type" = "postgres" ]; then - if [ -n "$database_container" ] && [ -n "$database_password" ] && [ -n "$database_name" ]; then - echo "Recover PostgreSQL dump" - export PGPASSWORD="$database_password" - cat "$backup_sql" | docker exec -i "$database_container" psql -v ON_ERROR_STOP=1 -U "$database_user" -d "$database_name" - if [ $? -ne 0 ]; then - echo "ERROR: Failed to recover PostgreSQL dump" - exit 1 - fi - exit 0 - fi - elif [ "$database_type" = "mariadb" ]; then - if [ -n "$database_container" ] && [ -n "$database_password" ] && [ -n "$database_name" ]; then - echo "recover mysql dump" - cat "$backup_sql" | docker exec -i "$database_container" mariadb -u "$database_user" --password="$database_password" "$database_name" - if [ $? -ne 0 ]; then - echo "ERROR: Failed to recover mysql dump" - exit 1 - fi - exit 0 - fi - fi - echo "A database backup exists, but a parameter is missing." - exit 1 -fi - -# FILE RECOVERY - -echo "Inspect volume $volume_name" -docker volume inspect "$volume_name" -exit_status_volume_inspect=$? - -if [ $exit_status_volume_inspect -eq 0 ]; then - echo "Volume $volume_name already exists" -else - echo "Create volume $volume_name" - docker volume create "$volume_name" - if [ $? -ne 0 ]; then - echo "ERROR: Failed to create volume $volume_name" - exit 1 - fi -fi - -if [ -d "$backup_files" ]; then - echo "recover files" - docker run --rm -v "$volume_name:/recover/" -v "$backup_files:/backup/" "kevinveenbirkenbach/alpine-rsync" sh -c "rsync -avv --delete /backup/ /recover/" - if [ $? -ne 0 ]; then - echo "ERROR: Failed to recover files" - exit 1 - fi - exit 0 -else - echo "ERROR: $backup_files doesn't exist" - exit 1 -fi - -echo "ERROR: Unhandled case" -exit 1 \ No newline at end of file diff --git a/requirements.yml b/requirements.yml deleted file mode 100644 index 7583709..0000000 --- a/requirements.yml +++ /dev/null @@ -1,5 +0,0 @@ -pacman: - - lsof - - python-pandas -pkgmgr: - - dirval \ No newline at end of file diff --git a/restore_backup.py b/restore_backup.py deleted file mode 100644 index 2eee608..0000000 --- a/restore_backup.py +++ /dev/null @@ -1,170 +0,0 @@ -#!/usr/bin/env python3 -# @todo Not tested yet. Needs to be tested -""" -restore_backup.py - -A script to recover Docker volumes and database dumps from local backups. -Supports an --empty flag to clear the database objects before import (drops all tables/functions etc.). -""" -import argparse -import os -import sys -import subprocess - - -def run_command(cmd, capture_output=False, input=None, **kwargs): - """Run a subprocess command and handle errors.""" - try: - result = subprocess.run(cmd, check=True, capture_output=capture_output, input=input, **kwargs) - return result - except subprocess.CalledProcessError as e: - print(f"ERROR: Command '{' '.join(cmd)}' failed with exit code {e.returncode}") - if e.stdout: - print(e.stdout.decode()) - if e.stderr: - print(e.stderr.decode()) - sys.exit(1) - - -def recover_postgres(container, password, db_name, user, backup_sql, empty=False): - print("Recovering PostgreSQL dump...") - os.environ['PGPASSWORD'] = password - if empty: - print("Dropping existing PostgreSQL objects...") - # Drop all tables, views, sequences, functions in public schema - drop_sql = """ -DO $$ DECLARE r RECORD; -BEGIN - FOR r IN ( - SELECT table_name AS name, 'TABLE' AS type FROM information_schema.tables WHERE table_schema='public' - UNION ALL - SELECT routine_name AS name, 'FUNCTION' AS type FROM information_schema.routines WHERE specific_schema='public' - UNION ALL - SELECT sequence_name AS name, 'SEQUENCE' AS type FROM information_schema.sequences WHERE sequence_schema='public' - ) LOOP - -- Use %s for type to avoid quoting the SQL keyword - EXECUTE format('DROP %s public.%I CASCADE', r.type, r.name); - END LOOP; -END -$$; -""" - run_command([ - 'docker', 'exec', '-i', container, - 'psql', '-v', 'ON_ERROR_STOP=1', '-U', user, '-d', db_name - ], input=drop_sql.encode()) - print("Existing objects dropped.") - print("Importing the dump...") - with open(backup_sql, 'rb') as f: - run_command([ - 'docker', 'exec', '-i', container, - 'psql', '-v', 'ON_ERROR_STOP=1', '-U', user, '-d', db_name - ], stdin=f) - print("PostgreSQL recovery complete.") - - -def recover_mariadb(container, password, db_name, user, backup_sql, empty=False): - print("Recovering MariaDB dump...") - if empty: - print("Dropping existing MariaDB tables...") - # Disable foreign key checks - run_command([ - 'docker', 'exec', container, - 'mysql', '-u', user, f"--password={password}", '-e', 'SET FOREIGN_KEY_CHECKS=0;' - ]) - # Get all table names - result = run_command([ - 'docker', 'exec', container, - 'mysql', '-u', user, f"--password={password}", '-N', '-e', - f"SELECT table_name FROM information_schema.tables WHERE table_schema = '{db_name}';" - ], capture_output=True) - tables = result.stdout.decode().split() - for tbl in tables: - run_command([ - 'docker', 'exec', container, - 'mysql', '-u', user, f"--password={password}", '-e', - f"DROP TABLE IF EXISTS `{db_name}`.`{tbl}`;" - ]) - # Enable foreign key checks - run_command([ - 'docker', 'exec', container, - 'mysql', '-u', user, f"--password={password}", '-e', 'SET FOREIGN_KEY_CHECKS=1;' - ]) - print("Existing tables dropped.") - print("Importing the dump...") - with open(backup_sql, 'rb') as f: - run_command([ - 'docker', 'exec', '-i', container, - 'mariadb', '-u', user, f"--password={password}", db_name - ], stdin=f) - print("MariaDB recovery complete.") - - -def recover_files(volume_name, backup_files): - print(f"Inspecting volume {volume_name}...") - inspect = subprocess.run(['docker', 'volume', 'inspect', volume_name], stdout=subprocess.DEVNULL) - if inspect.returncode != 0: - print(f"Volume {volume_name} does not exist. Creating...") - run_command(['docker', 'volume', 'create', volume_name]) - else: - print(f"Volume {volume_name} already exists.") - - if not os.path.isdir(backup_files): - print(f"ERROR: Backup files folder '{backup_files}' does not exist.") - sys.exit(1) - - print("Recovering files...") - run_command([ - 'docker', 'run', '--rm', - '-v', f"{volume_name}:/recover/", - '-v', f"{backup_files}:/backup/", - 'kevinveenbirkenbach/alpine-rsync', - 'sh', '-c', 'rsync -avv --delete /backup/ /recover/' - ]) - print("File recovery complete.") - - -def main(): - parser = argparse.ArgumentParser( - description='Recover Docker volumes and database dumps from local backups.' - ) - parser.add_argument('volume_name', help='Name of the Docker volume') - parser.add_argument('backup_hash', help='Hashed Machine ID') - parser.add_argument('version', help='Version to recover') - - parser.add_argument('--db-type', choices=['postgres', 'mariadb'], help='Type of database backup') - parser.add_argument('--db-container', help='Docker container name for the database') - parser.add_argument('--db-password', help='Password for the database user') - parser.add_argument('--db-name', help='Name of the database') - parser.add_argument('--empty', action='store_true', help='Drop existing database objects before importing') - - args = parser.parse_args() - - volume = args.volume_name - backup_hash = args.backup_hash - version = args.version - - backup_folder = os.path.join('Backups', backup_hash, 'backup-docker-to-local', version, volume) - backup_files = os.path.join(os.sep, backup_folder, 'files') - backup_sql = None - if args.db_name: - backup_sql = os.path.join(os.sep, backup_folder, 'sql', f"{args.db_name}.backup.sql") - - # Database recovery - if args.db_type: - if not (args.db_container and args.db_password and args.db_name): - print("ERROR: A database backup exists, aber ein Parameter fehlt.") - sys.exit(1) - - user = args.db_name - if args.db_type == 'postgres': - recover_postgres(args.db_container, args.db_password, args.db_name, user, backup_sql, empty=args.empty) - else: - recover_mariadb(args.db_container, args.db_password, args.db_name, user, backup_sql, empty=args.empty) - sys.exit(0) - - # File recovery - recover_files(volume, backup_files) - - -if __name__ == '__main__': - main() diff --git a/restore_postgres_databases.py b/restore_postgres_databases.py deleted file mode 100644 index d3e22c4..0000000 --- a/restore_postgres_databases.py +++ /dev/null @@ -1,96 +0,0 @@ -#!/usr/bin/env python3 -""" -Restore multiple PostgreSQL databases from .backup.sql files via a Docker container. - -Usage: - ./restore_databases.py /path/to/backup_dir container_name -""" -import argparse -import subprocess -import sys -import os -import glob - -def run_command(cmd, stdin=None): - """ - Run a subprocess command and abort immediately on any failure. - :param cmd: list of command parts - :param stdin: file-like object to use as stdin - """ - subprocess.run(cmd, stdin=stdin, check=True) - - -def main(): - parser = argparse.ArgumentParser( - description="Restore Postgres databases from backup SQL files via Docker container." - ) - parser.add_argument( - "backup_dir", - help="Path to directory containing .backup.sql files" - ) - parser.add_argument( - "container", - help="Name of the Postgres Docker container" - ) - args = parser.parse_args() - - backup_dir = args.backup_dir - container = args.container - - pattern = os.path.join(backup_dir, "*.backup.sql") - sql_files = sorted(glob.glob(pattern)) - if not sql_files: - print(f"No .backup.sql files found in {backup_dir}", file=sys.stderr) - sys.exit(1) - - for sqlfile in sql_files: - # Extract database name by stripping the full suffix '.backup.sql' - filename = os.path.basename(sqlfile) - if not filename.endswith('.backup.sql'): - continue - dbname = filename[:-len('.backup.sql')] - print(f"=== Processing {sqlfile} → database: {dbname} ===") - - # Drop the database, forcing disconnect of sessions if necessary - run_command([ - "docker", "exec", "-i", container, - "psql", "-U", "postgres", "-c", - f"DROP DATABASE IF EXISTS \"{dbname}\" WITH (FORCE);" - ]) - - # Create a fresh database - run_command([ - "docker", "exec", "-i", container, - "psql", "-U", "postgres", "-c", - f"CREATE DATABASE \"{dbname}\";" - ]) - - # Ensure the ownership role exists - print(f"Ensuring role '{dbname}' exists...") - run_command([ - "docker", "exec", "-i", container, - "psql", "-U", "postgres", "-c", - ( - "DO $$BEGIN " - f"IF NOT EXISTS (SELECT FROM pg_roles WHERE rolname = '{dbname}') THEN " - f"CREATE ROLE \"{dbname}\"; " - "END IF; " - "END$$;" - ) - ]) - - # Restore the dump into the database by streaming file (will abort on first error) - print(f"Restoring dump into {dbname} (this may take a while)…") - with open(sqlfile, 'rb') as infile: - run_command([ - "docker", "exec", "-i", container, - "psql", "-U", "postgres", "-d", dbname - ], stdin=infile) - - print(f"✔ {dbname} restored.") - - print("All databases have been restored.") - - -if __name__ == "__main__": - main() diff --git a/scripts/test-e2e.sh b/scripts/test-e2e.sh new file mode 100755 index 0000000..86988ac --- /dev/null +++ b/scripts/test-e2e.sh @@ -0,0 +1,234 @@ +#!/usr/bin/env bash +set -euo pipefail + +# ----------------------------------------------------------------------------- +# E2E runner using Docker-in-Docker (DinD) with debug-on-failure +# +# Debug toggles: +# E2E_KEEP_ON_FAIL=1 -> keep DinD + volumes + network if tests fail +# E2E_KEEP_VOLUMES=1 -> keep volumes even on success/cleanup +# E2E_DEBUG_SHELL=1 -> open an interactive shell in the test container instead of running tests +# E2E_ARTIFACTS_DIR=./artifacts +# ----------------------------------------------------------------------------- + +NET="${E2E_NET:-baudolo-e2e-net}" +DIND="${E2E_DIND_NAME:-baudolo-e2e-dind}" +DIND_VOL="${E2E_DIND_VOL:-baudolo-e2e-dind-data}" +E2E_TMP_VOL="${E2E_TMP_VOL:-baudolo-e2e-tmp}" + +DIND_HOST="${E2E_DIND_HOST:-tcp://127.0.0.1:2375}" +DIND_HOST_IN_NET="${E2E_DIND_HOST_IN_NET:-tcp://${DIND}:2375}" + +IMG="${E2E_IMAGE:-baudolo:local}" +RSYNC_IMG="${E2E_RSYNC_IMAGE:-ghcr.io/kevinveenbirkenbach/alpine-rsync}" + +READY_TIMEOUT_SECONDS="${E2E_READY_TIMEOUT_SECONDS:-120}" +ARTIFACTS_DIR="${E2E_ARTIFACTS_DIR:-./artifacts}" + +KEEP_ON_FAIL="${E2E_KEEP_ON_FAIL:-0}" +KEEP_VOLUMES="${E2E_KEEP_VOLUMES:-0}" +DEBUG_SHELL="${E2E_DEBUG_SHELL:-0}" + +FAILED=0 +TS="$(date +%Y%m%d%H%M%S)" + +mkdir -p "${ARTIFACTS_DIR}" + +log() { echo ">> $*"; } + +dump_debug() { + log "DEBUG: collecting diagnostics into ${ARTIFACTS_DIR}" + + { + echo "=== Host docker version ===" + docker version || true + echo + echo "=== Host docker info ===" + docker info || true + echo + echo "=== DinD reachable? (docker -H ${DIND_HOST} version) ===" + docker -H "${DIND_HOST}" version || true + echo + } > "${ARTIFACTS_DIR}/debug-host-${TS}.txt" 2>&1 || true + + # DinD logs + docker logs --tail=5000 "${DIND}" > "${ARTIFACTS_DIR}/dind-logs-${TS}.txt" 2>&1 || true + + # DinD state + { + echo "=== docker -H ps -a ===" + docker -H "${DIND_HOST}" ps -a || true + echo + echo "=== docker -H images ===" + docker -H "${DIND_HOST}" images || true + echo + echo "=== docker -H network ls ===" + docker -H "${DIND_HOST}" network ls || true + echo + echo "=== docker -H volume ls ===" + docker -H "${DIND_HOST}" volume ls || true + echo + echo "=== docker -H system df ===" + docker -H "${DIND_HOST}" system df || true + } > "${ARTIFACTS_DIR}/debug-dind-${TS}.txt" 2>&1 || true + + # Try to capture recent events (best effort; might be noisy) + docker -H "${DIND_HOST}" events --since 10m --until 0s \ + > "${ARTIFACTS_DIR}/dind-events-${TS}.txt" 2>&1 || true + + # Dump shared /tmp content from the tmp volume: + # We create a temporary container that mounts the volume, then tar its content. + # (Does not rely on host filesystem paths.) + log "DEBUG: archiving shared /tmp (volume ${E2E_TMP_VOL})" + docker -H "${DIND_HOST}" run --rm \ + -v "${E2E_TMP_VOL}:/tmp" \ + alpine:3.20 \ + sh -lc 'cd /tmp && tar -czf /out.tar.gz . || true' \ + >/dev/null 2>&1 || true + + # The above writes inside the container FS, not to host. So do it properly: + # Use "docker cp" from a temp container. + local tmpc="baudolo-e2e-tmpdump-${TS}" + docker -H "${DIND_HOST}" rm -f "${tmpc}" >/dev/null 2>&1 || true + docker -H "${DIND_HOST}" create --name "${tmpc}" -v "${E2E_TMP_VOL}:/tmp" alpine:3.20 \ + sh -lc 'cd /tmp && tar -czf /tmpdump.tar.gz . || true' >/dev/null + docker -H "${DIND_HOST}" start -a "${tmpc}" >/dev/null 2>&1 || true + docker -H "${DIND_HOST}" cp "${tmpc}:/tmpdump.tar.gz" "${ARTIFACTS_DIR}/e2e-tmp-${TS}.tar.gz" >/dev/null 2>&1 || true + docker -H "${DIND_HOST}" rm -f "${tmpc}" >/dev/null 2>&1 || true + + log "DEBUG: artifacts written:" + ls -la "${ARTIFACTS_DIR}" | sed 's/^/ /' || true +} + +cleanup() { + if [ "${FAILED}" -eq 1 ] && [ "${KEEP_ON_FAIL}" = "1" ]; then + log "KEEP_ON_FAIL=1 and failure detected -> skipping cleanup." + log "Next steps:" + echo " - Inspect DinD logs: docker logs ${DIND} | less" + echo " - Use DinD daemon: docker -H ${DIND_HOST} ps -a" + echo " - Shared tmp vol: docker -H ${DIND_HOST} run --rm -v ${E2E_TMP_VOL}:/tmp alpine:3.20 ls -la /tmp" + echo " - DinD docker root: docker -H ${DIND_HOST} run --rm -v ${DIND_VOL}:/var/lib/docker alpine:3.20 ls -la /var/lib/docker/volumes" + return 0 + fi + + log "Cleanup: stopping ${DIND} and removing network ${NET}" + docker rm -f "${DIND}" >/dev/null 2>&1 || true + docker network rm "${NET}" >/dev/null 2>&1 || true + + if [ "${KEEP_VOLUMES}" != "1" ]; then + docker volume rm -f "${DIND_VOL}" >/dev/null 2>&1 || true + docker volume rm -f "${E2E_TMP_VOL}" >/dev/null 2>&1 || true + else + log "Keeping volumes (E2E_KEEP_VOLUMES=1): ${DIND_VOL}, ${E2E_TMP_VOL}" + fi +} +trap cleanup EXIT INT TERM + +log "Creating network ${NET} (if missing)" +docker network inspect "${NET}" >/dev/null 2>&1 || docker network create "${NET}" >/dev/null + +log "Removing old ${DIND} (if any)" +docker rm -f "${DIND}" >/dev/null 2>&1 || true + +log "(Re)creating DinD data volume ${DIND_VOL}" +docker volume rm -f "${DIND_VOL}" >/dev/null 2>&1 || true +docker volume create "${DIND_VOL}" >/dev/null + +log "(Re)creating shared /tmp volume ${E2E_TMP_VOL}" +docker volume rm -f "${E2E_TMP_VOL}" >/dev/null 2>&1 || true +docker volume create "${E2E_TMP_VOL}" >/dev/null + +log "Starting Docker-in-Docker daemon ${DIND}" +docker run -d --privileged \ + --name "${DIND}" \ + --network "${NET}" \ + -e DOCKER_TLS_CERTDIR="" \ + -v "${DIND_VOL}:/var/lib/docker" \ + -v "${E2E_TMP_VOL}:/tmp" \ + -p 2375:2375 \ + docker:dind \ + --host=tcp://0.0.0.0:2375 \ + --tls=false >/dev/null + +log "Waiting for DinD to be ready..." +for i in $(seq 1 "${READY_TIMEOUT_SECONDS}"); do + if docker -H "${DIND_HOST}" version >/dev/null 2>&1; then + log "DinD is ready." + break + fi + sleep 1 + if [ "${i}" -eq "${READY_TIMEOUT_SECONDS}" ]; then + echo "ERROR: DinD did not become ready in time" + docker logs --tail=200 "${DIND}" || true + FAILED=1 + dump_debug || true + exit 1 + fi +done + +log "Pre-pulling helper images in DinD..." +log " - Pulling: ${RSYNC_IMG}" +docker -H "${DIND_HOST}" pull "${RSYNC_IMG}" + +log "Ensuring alpine exists in DinD (for debug helpers)" +docker -H "${DIND_HOST}" pull alpine:3.20 >/dev/null + +log "Loading ${IMG} image into DinD..." +docker save "${IMG}" | docker -H "${DIND_HOST}" load >/dev/null + +log "Running E2E tests inside DinD" +set +e +if [ "${DEBUG_SHELL}" = "1" ]; then + log "E2E_DEBUG_SHELL=1 -> opening shell in test container" + docker run --rm -it \ + --network "${NET}" \ + -e DOCKER_HOST="${DIND_HOST_IN_NET}" \ + -e E2E_RSYNC_IMAGE="${RSYNC_IMG}" \ + -v "${DIND_VOL}:/var/lib/docker:ro" \ + -v "${E2E_TMP_VOL}:/tmp" \ + "${IMG}" \ + sh -lc ' + set -e + if [ ! -f /etc/machine-id ]; then + mkdir -p /etc + cat /proc/sys/kernel/random/uuid > /etc/machine-id + fi + echo ">> DOCKER_HOST=${DOCKER_HOST}" + docker ps -a || true + exec sh + ' + rc=$? +else + docker run --rm \ + --network "${NET}" \ + -e DOCKER_HOST="${DIND_HOST_IN_NET}" \ + -e E2E_RSYNC_IMAGE="${RSYNC_IMG}" \ + -v "${DIND_VOL}:/var/lib/docker:ro" \ + -v "${E2E_TMP_VOL}:/tmp" \ + "${IMG}" \ + sh -lc ' + set -euo pipefail + set -x + export PYTHONUNBUFFERED=1 + + export TMPDIR=/tmp TMP=/tmp TEMP=/tmp + + if [ ! -f /etc/machine-id ]; then + mkdir -p /etc + cat /proc/sys/kernel/random/uuid > /etc/machine-id + fi + + python -m unittest discover -t . -s tests/e2e -p "test_*.py" -v -f + ' + rc=$? +fi +set -e + +if [ "${rc}" -ne 0 ]; then + FAILED=1 + echo "ERROR: E2E tests failed (exit code: ${rc})" + dump_debug || true + exit "${rc}" +fi + +log "E2E tests passed." diff --git a/src/baudolo/__init__.py b/src/baudolo/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/src/baudolo/backup/__init__.py b/src/baudolo/backup/__init__.py new file mode 100644 index 0000000..f8ece81 --- /dev/null +++ b/src/baudolo/backup/__init__.py @@ -0,0 +1 @@ +"""Baudolo backup package.""" diff --git a/src/baudolo/backup/__main__.py b/src/baudolo/backup/__main__.py new file mode 100644 index 0000000..1eda132 --- /dev/null +++ b/src/baudolo/backup/__main__.py @@ -0,0 +1,9 @@ +#!/usr/bin/env python3 + +from __future__ import annotations + +from .app import main + + +if __name__ == "__main__": + raise SystemExit(main()) diff --git a/src/baudolo/backup/app.py b/src/baudolo/backup/app.py new file mode 100644 index 0000000..f297a68 --- /dev/null +++ b/src/baudolo/backup/app.py @@ -0,0 +1,183 @@ +from __future__ import annotations + +import os +import pathlib +from datetime import datetime + +import pandas +from dirval import create_stamp_file + +from .cli import parse_args +from .compose import handle_docker_compose_services +from .db import backup_database +from .docker import ( + change_containers_status, + containers_using_volume, + docker_volume_names, + get_image_info, + has_image, +) +from .shell import execute_shell_command +from .volume import backup_volume + + +def get_machine_id() -> str: + return execute_shell_command("sha256sum /etc/machine-id")[0][0:64] + + +def stamp_directory(version_dir: str) -> None: + """ + Use dirval as a Python library to stamp the directory (no CLI dependency). + """ + create_stamp_file(version_dir) + + +def create_version_directory(versions_dir: str, backup_time: str) -> str: + version_dir = os.path.join(versions_dir, backup_time) + pathlib.Path(version_dir).mkdir(parents=True, exist_ok=True) + return version_dir + + +def create_volume_directory(version_dir: str, volume_name: str) -> str: + path = os.path.join(version_dir, volume_name) + pathlib.Path(path).mkdir(parents=True, exist_ok=True) + return path + + +def is_image_ignored(container: str, images_no_backup_required: list[str]) -> bool: + if not images_no_backup_required: + return False + img = get_image_info(container) + return any(pat in img for pat in images_no_backup_required) + + +def volume_is_fully_ignored(containers: list[str], images_no_backup_required: list[str]) -> bool: + """ + Skip file backup only if all containers linked to the volume are ignored. + """ + if not containers: + return False + return all(is_image_ignored(c, images_no_backup_required) for c in containers) + + +def requires_stop(containers: list[str], images_no_stop_required: list[str]) -> bool: + """ + Stop is required if ANY container image is NOT in the whitelist patterns. + """ + for c in containers: + img = get_image_info(c) + if not any(pat in img for pat in images_no_stop_required): + return True + return False + + +def backup_mariadb_or_postgres( + *, + container: str, + volume_dir: str, + databases_df: "pandas.DataFrame", + database_containers: list[str], +) -> bool: + """ + Returns True if the container is a DB container we handled. + """ + for img in ["mariadb", "postgres"]: + if has_image(container, img): + backup_database( + container=container, + volume_dir=volume_dir, + db_type=img, + databases_df=databases_df, + database_containers=database_containers, + ) + return True + return False + + +def _backup_dumps_for_volume( + *, + containers: list[str], + vol_dir: str, + databases_df: "pandas.DataFrame", + database_containers: list[str], +) -> bool: + """ + Create DB dumps for any mariadb/postgres containers attached to this volume. + Returns True if at least one dump was produced. + """ + dumped_any = False + for c in containers: + if backup_mariadb_or_postgres( + container=c, + volume_dir=vol_dir, + databases_df=databases_df, + database_containers=database_containers, + ): + dumped_any = True + return dumped_any + + +def main() -> int: + args = parse_args() + + machine_id = get_machine_id() + backup_time = datetime.now().strftime("%Y%m%d%H%M%S") + + versions_dir = os.path.join(args.backups_dir, machine_id, args.repo_name) + version_dir = create_version_directory(versions_dir, backup_time) + + databases_df = pandas.read_csv(args.databases_csv, sep=";") + + print("💾 Start volume backups...", flush=True) + + for volume_name in docker_volume_names(): + print(f"Start backup routine for volume: {volume_name}", flush=True) + containers = containers_using_volume(volume_name) + + vol_dir = create_volume_directory(version_dir, volume_name) + + # Old behavior: DB dumps are additional to file backups. + _backup_dumps_for_volume( + containers=containers, + vol_dir=vol_dir, + databases_df=databases_df, + database_containers=args.database_containers, + ) + + # dump-only: skip ALL file rsync backups + if args.dump_only: + continue + + # skip file backup if all linked containers are ignored + if volume_is_fully_ignored(containers, args.images_no_backup_required): + print( + f"Skipping file backup for volume '{volume_name}' (all linked containers are ignored).", + flush=True, + ) + continue + + if args.everything: + # "everything": always do pre-rsync, then stop + rsync again + backup_volume(versions_dir, volume_name, vol_dir) + change_containers_status(containers, "stop") + backup_volume(versions_dir, volume_name, vol_dir) + if not args.shutdown: + change_containers_status(containers, "start") + continue + + # default: rsync, and if needed stop + rsync + backup_volume(versions_dir, volume_name, vol_dir) + if requires_stop(containers, args.images_no_stop_required): + change_containers_status(containers, "stop") + backup_volume(versions_dir, volume_name, vol_dir) + if not args.shutdown: + change_containers_status(containers, "start") + + # Stamp the backup version directory using dirval (python lib) + stamp_directory(version_dir) + print("Finished volume backups.", flush=True) + + print("Handling Docker Compose services...", flush=True) + handle_docker_compose_services(args.compose_dir, args.docker_compose_hard_restart_required) + + return 0 diff --git a/src/baudolo/backup/cli.py b/src/baudolo/backup/cli.py new file mode 100644 index 0000000..2de50ee --- /dev/null +++ b/src/baudolo/backup/cli.py @@ -0,0 +1,93 @@ +from __future__ import annotations + +import argparse +import os +from pathlib import Path + + +def _default_repo_name() -> str: + """ + Derive the repository name from the folder that contains `src/`. + + Expected layout: + /src/baudolo/backup/cli.py + + => parents[0]=backup, [1]=baudolo, [2]=src, [3]=repo-root + """ + try: + return Path(__file__).resolve().parents[3].name + except Exception: + return "backup-docker-to-local" + + +def parse_args() -> argparse.Namespace: + dirname = os.path.dirname(__file__) + default_databases_csv = os.path.join(dirname, "databases.csv") + + p = argparse.ArgumentParser(description="Backup Docker volumes.") + + p.add_argument( + "--compose-dir", + type=str, + required=True, + help="Path to the parent directory containing docker-compose setups", + ) + p.add_argument( + "--docker-compose-hard-restart-required", + nargs="+", + default=["mailu"], + help="Compose dir names that require 'docker-compose down && up -d' (default: mailu)", + ) + + p.add_argument( + "--repo-name", + default=_default_repo_name(), + help="Backup repo folder name under // (default: git repo folder name)", + ) + p.add_argument( + "--databases-csv", + default=default_databases_csv, + help=f"Path to databases.csv (default: {default_databases_csv})", + ) + p.add_argument( + "--backups-dir", + default="/Backups", + help="Backup root directory (default: /Backups)", + ) + + p.add_argument( + "--database-containers", + nargs="+", + required=True, + help="Container names treated as special instances for database backups", + ) + p.add_argument( + "--images-no-stop-required", + nargs="+", + required=True, + help="Image name patterns for which containers should not be stopped during file backup", + ) + p.add_argument( + "--images-no-backup-required", + nargs="+", + default=[], + help="Image name patterns for which no backup should be performed", + ) + + p.add_argument( + "--everything", + action="store_true", + help="Force file backup for all volumes and also execute database dumps (like old script)", + ) + p.add_argument( + "--shutdown", + action="store_true", + help="Do not restart containers after backup", + ) + p.add_argument( + "--dump-only", + action="store_true", + help="Only create DB dumps (skip ALL file rsync backups)", + ) + + return p.parse_args() diff --git a/src/baudolo/backup/compose.py b/src/baudolo/backup/compose.py new file mode 100644 index 0000000..dc0bd16 --- /dev/null +++ b/src/baudolo/backup/compose.py @@ -0,0 +1,31 @@ +from __future__ import annotations + +import os +import subprocess + + +def hard_restart_docker_services(dir_path: str) -> None: + print(f"Hard restart docker-compose services in: {dir_path}", flush=True) + subprocess.run(["docker-compose", "down"], cwd=dir_path, check=True) + subprocess.run(["docker-compose", "up", "-d"], cwd=dir_path, check=True) + + +def handle_docker_compose_services(parent_directory: str, hard_restart_required: list[str]) -> None: + for entry in os.scandir(parent_directory): + if not entry.is_dir(): + continue + + dir_path = entry.path + name = os.path.basename(dir_path) + compose_file = os.path.join(dir_path, "docker-compose.yml") + + print(f"Checking directory: {dir_path}", flush=True) + if not os.path.isfile(compose_file): + print("No docker-compose.yml found. Skipping.", flush=True) + continue + + if name in hard_restart_required: + print(f"{name}: hard restart required.", flush=True) + hard_restart_docker_services(dir_path) + else: + print(f"{name}: no restart required.", flush=True) diff --git a/src/baudolo/backup/db.py b/src/baudolo/backup/db.py new file mode 100644 index 0000000..546b9ac --- /dev/null +++ b/src/baudolo/backup/db.py @@ -0,0 +1,73 @@ +from __future__ import annotations + +import os +import pathlib +import re + +import pandas + +from .shell import BackupException, execute_shell_command + + +def get_instance(container: str, database_containers: list[str]) -> str: + if container in database_containers: + return container + return re.split(r"(_|-)(database|db|postgres)", container)[0] + + +def fallback_pg_dumpall(container: str, username: str, password: str, out_file: str) -> None: + cmd = ( + f"PGPASSWORD={password} docker exec -i {container} " + f"pg_dumpall -U {username} -h localhost > {out_file}" + ) + execute_shell_command(cmd) + + +def backup_database( + *, + container: str, + volume_dir: str, + db_type: str, + databases_df: "pandas.DataFrame", + database_containers: list[str], +) -> None: + instance_name = get_instance(container, database_containers) + entries = databases_df.loc[databases_df["instance"] == instance_name] + if entries.empty: + raise BackupException(f"No entry found for instance '{instance_name}'") + + out_dir = os.path.join(volume_dir, "sql") + pathlib.Path(out_dir).mkdir(parents=True, exist_ok=True) + + for row in entries.iloc: + db_name = row["database"] + user = row["username"] + password = row["password"] + + dump_file = os.path.join(out_dir, f"{db_name}.backup.sql") + + if db_type == "mariadb": + cmd = ( + f"docker exec {container} /usr/bin/mariadb-dump " + f"-u {user} -p{password} {db_name} > {dump_file}" + ) + execute_shell_command(cmd) + continue + + if db_type == "postgres": + cluster_file = os.path.join(out_dir, f"{instance_name}.cluster.backup.sql") + if not db_name: + fallback_pg_dumpall(container, user, password, cluster_file) + return + + try: + cmd = ( + f"PGPASSWORD={password} docker exec -i {container} " + f"pg_dump -U {user} -d {db_name} -h localhost > {dump_file}" + ) + execute_shell_command(cmd) + except BackupException as e: + print(f"pg_dump failed: {e}", flush=True) + print(f"Falling back to pg_dumpall for instance '{instance_name}'", flush=True) + fallback_pg_dumpall(container, user, password, cluster_file) + continue diff --git a/src/baudolo/backup/docker.py b/src/baudolo/backup/docker.py new file mode 100644 index 0000000..28323c9 --- /dev/null +++ b/src/baudolo/backup/docker.py @@ -0,0 +1,43 @@ +from __future__ import annotations + +from .shell import execute_shell_command + + +def get_image_info(container: str) -> str: + return execute_shell_command( + f"docker inspect --format '{{{{.Config.Image}}}}' {container}" + )[0] + + +def has_image(container: str, pattern: str) -> bool: + """Return True if container's image contains the pattern.""" + return pattern in get_image_info(container) + + +def docker_volume_names() -> list[str]: + return execute_shell_command("docker volume ls --format '{{.Name}}'") + + +def containers_using_volume(volume_name: str) -> list[str]: + return execute_shell_command( + f"docker ps --filter volume=\"{volume_name}\" --format '{{{{.Names}}}}'" + ) + + +def change_containers_status(containers: list[str], status: str) -> None: + """Stop or start a list of containers.""" + if not containers: + print(f"No containers to {status}.", flush=True) + return + names = " ".join(containers) + print(f"{status.capitalize()} containers: {names}...", flush=True) + execute_shell_command(f"docker {status} {names}") + + +def docker_volume_exists(volume: str) -> bool: + # Avoid throwing exceptions for exists checks. + try: + execute_shell_command(f"docker volume inspect {volume} >/dev/null 2>&1 && echo OK") + return True + except Exception: + return False diff --git a/src/baudolo/backup/shell.py b/src/baudolo/backup/shell.py new file mode 100644 index 0000000..4ca650f --- /dev/null +++ b/src/baudolo/backup/shell.py @@ -0,0 +1,26 @@ +from __future__ import annotations + +import subprocess + + +class BackupException(Exception): + """Generic exception for backup errors.""" + + +def execute_shell_command(command: str) -> list[str]: + """Execute a shell command and return its output lines.""" + print(command, flush=True) + process = subprocess.Popen( + [command], + stdout=subprocess.PIPE, + stderr=subprocess.PIPE, + shell=True, + ) + out, err = process.communicate() + if process.returncode != 0: + raise BackupException( + f"Error in command: {command}\n" + f"Output: {out}\nError: {err}\n" + f"Exit code: {process.returncode}" + ) + return [line.decode("utf-8") for line in out.splitlines()] diff --git a/src/baudolo/backup/volume.py b/src/baudolo/backup/volume.py new file mode 100644 index 0000000..ae81f15 --- /dev/null +++ b/src/baudolo/backup/volume.py @@ -0,0 +1,42 @@ +from __future__ import annotations + +import os +import pathlib + +from .shell import BackupException, execute_shell_command + + +def get_storage_path(volume_name: str) -> str: + path = execute_shell_command( + f"docker volume inspect --format '{{{{ .Mountpoint }}}}' {volume_name}" + )[0] + return f"{path}/" + + +def get_last_backup_dir(versions_dir: str, volume_name: str, current_backup_dir: str) -> str | None: + versions = sorted(os.listdir(versions_dir), reverse=True) + for version in versions: + candidate = os.path.join(versions_dir, version, volume_name, "files", "") + if candidate != current_backup_dir and os.path.isdir(candidate): + return candidate + return None + + +def backup_volume(versions_dir: str, volume_name: str, volume_dir: str) -> None: + """Perform incremental file backup of a Docker volume.""" + dest = os.path.join(volume_dir, "files") + "/" + pathlib.Path(dest).mkdir(parents=True, exist_ok=True) + + last = get_last_backup_dir(versions_dir, volume_name, dest) + link_dest = f"--link-dest='{last}'" if last else "" + source = get_storage_path(volume_name) + + cmd = f"rsync -abP --delete --delete-excluded {link_dest} {source} {dest}" + + try: + execute_shell_command(cmd) + except BackupException as e: + if "file has vanished" in str(e): + print("Warning: Some files vanished before transfer. Continuing.", flush=True) + else: + raise diff --git a/database_entry_seeder.py b/src/baudolo/configure/__main__.py similarity index 100% rename from database_entry_seeder.py rename to src/baudolo/configure/__main__.py diff --git a/src/baudolo/restore/__init__.py b/src/baudolo/restore/__init__.py new file mode 100644 index 0000000..6f445b5 --- /dev/null +++ b/src/baudolo/restore/__init__.py @@ -0,0 +1 @@ +__all__ = ["main"] \ No newline at end of file diff --git a/src/baudolo/restore/__main__.py b/src/baudolo/restore/__main__.py new file mode 100644 index 0000000..a4dd2c0 --- /dev/null +++ b/src/baudolo/restore/__main__.py @@ -0,0 +1,103 @@ +from __future__ import annotations + +import argparse +import sys + +from .paths import BackupPaths +from .files import restore_volume_files +from .db.postgres import restore_postgres_sql +from .db.mariadb import restore_mariadb_sql + + +def _add_common_backup_args(p: argparse.ArgumentParser) -> None: + p.add_argument("volume_name", help="Docker volume name") + p.add_argument("backup_hash", help="Hashed machine id") + p.add_argument("version", help="Backup version directory name") + + p.add_argument( + "--backups-dir", + default="/Backups", + help="Backup root directory (default: /Backups)", + ) + p.add_argument( + "--repo-name", + default="backup-docker-to-local", + help="Backup repo folder name under // (default: backup-docker-to-local)", + ) + + +def main(argv: list[str] | None = None) -> int: + parser = argparse.ArgumentParser( + prog="baudolo-restore", + description="Restore docker volume files and DB dumps.", + ) + sub = parser.add_subparsers(dest="cmd", required=True) + + p_files = sub.add_parser("files", help="Restore files into a docker volume") + _add_common_backup_args(p_files) + p_files.add_argument("--rsync-image", default="ghcr.io/kevinveenbirkenbach/alpine-rsync") + + p_pg = sub.add_parser("postgres", help="Restore a single PostgreSQL database dump") + _add_common_backup_args(p_pg) + p_pg.add_argument("--container", required=True) + p_pg.add_argument("--db-name", required=True) + p_pg.add_argument("--db-user", default=None, help="Defaults to db-name if omitted") + p_pg.add_argument("--db-password", required=True) + p_pg.add_argument("--empty", action="store_true") + + p_mdb = sub.add_parser("mariadb", help="Restore a single MariaDB/MySQL-compatible dump") + _add_common_backup_args(p_mdb) + p_mdb.add_argument("--container", required=True) + p_mdb.add_argument("--db-name", required=True) + p_mdb.add_argument("--db-user", default=None, help="Defaults to db-name if omitted") + p_mdb.add_argument("--db-password", required=True) + p_mdb.add_argument("--empty", action="store_true") + + args = parser.parse_args(argv) + + bp = BackupPaths( + args.volume_name, + args.backup_hash, + args.version, + repo_name=args.repo_name, + backups_dir=args.backups_dir, + ) + + try: + if args.cmd == "files": + return restore_volume_files(args.volume_name, bp.files_dir(), rsync_image=args.rsync_image) + + if args.cmd == "postgres": + user = args.db_user or args.db_name + restore_postgres_sql( + container=args.container, + db_name=args.db_name, + user=user, + password=args.db_password, + sql_path=bp.sql_file(args.db_name), + empty=args.empty, + ) + return 0 + + if args.cmd == "mariadb": + user = args.db_user or args.db_name + restore_mariadb_sql( + container=args.container, + db_name=args.db_name, + user=user, + password=args.db_password, + sql_path=bp.sql_file(args.db_name), + empty=args.empty, + ) + return 0 + + parser.error("Unhandled command") + return 2 + + except Exception as e: + print(f"ERROR: {e}", file=sys.stderr) + return 1 + + +if __name__ == "__main__": + raise SystemExit(main()) diff --git a/src/baudolo/restore/db/__init__.py b/src/baudolo/restore/db/__init__.py new file mode 100644 index 0000000..559a9fe --- /dev/null +++ b/src/baudolo/restore/db/__init__.py @@ -0,0 +1 @@ +"""Database restore handlers (Postgres, MariaDB/MySQL).""" \ No newline at end of file diff --git a/src/baudolo/restore/db/mariadb.py b/src/baudolo/restore/db/mariadb.py new file mode 100644 index 0000000..ab3daa6 --- /dev/null +++ b/src/baudolo/restore/db/mariadb.py @@ -0,0 +1,83 @@ +from __future__ import annotations + +import os +import sys + +from ..run import docker_exec, docker_exec_sh + + +def _pick_client(container: str) -> str: + # Prefer mariadb, fallback to mysql (many images provide one or both). + script = r""" +set -eu +if command -v mariadb >/dev/null 2>&1; then echo mariadb; exit 0; fi +if command -v mysql >/dev/null 2>&1; then echo mysql; exit 0; fi +exit 42 +""" + try: + out = docker_exec_sh(container, script, capture=True).stdout.decode().strip() + if not out: + raise RuntimeError("empty client detection output") + return out + except Exception as e: + print("ERROR: neither 'mariadb' nor 'mysql' found in container.", file=sys.stderr) + raise e + + +def restore_mariadb_sql( + *, + container: str, + db_name: str, + user: str, + password: str, + sql_path: str, + empty: bool, +) -> None: + client = _pick_client(container) + + if not os.path.isfile(sql_path): + raise FileNotFoundError(sql_path) + + if empty: + # Close to old behavior: list tables, drop individually, then re-enable checks. + docker_exec( + container, + ["mysql", "-u", user, f"--password={password}", "-e", "SET FOREIGN_KEY_CHECKS=0;"], + ) + + result = docker_exec( + container, + [ + "mysql", + "-u", + user, + f"--password={password}", + "-N", + "-e", + f"SELECT table_name FROM information_schema.tables WHERE table_schema = '{db_name}';", + ], + capture=True, + ) + tables = result.stdout.decode().split() + for tbl in tables: + docker_exec( + container, + [ + "mysql", + "-u", + user, + f"--password={password}", + "-e", + f"DROP TABLE IF EXISTS `{db_name}`.`{tbl}`;", + ], + ) + + docker_exec( + container, + ["mysql", "-u", user, f"--password={password}", "-e", "SET FOREIGN_KEY_CHECKS=1;"], + ) + + with open(sql_path, "rb") as f: + docker_exec(container, [client, "-u", user, f"--password={password}", db_name], stdin=f) + + print(f"MariaDB/MySQL restore complete for db '{db_name}'.") diff --git a/src/baudolo/restore/db/postgres.py b/src/baudolo/restore/db/postgres.py new file mode 100644 index 0000000..8b002d3 --- /dev/null +++ b/src/baudolo/restore/db/postgres.py @@ -0,0 +1,53 @@ +from __future__ import annotations + +import os + +from ..run import docker_exec + + +def restore_postgres_sql( + *, + container: str, + db_name: str, + user: str, + password: str, + sql_path: str, + empty: bool, +) -> None: + if not os.path.isfile(sql_path): + raise FileNotFoundError(sql_path) + + # Make password available INSIDE the container for psql. + docker_env = {"PGPASSWORD": password} + + if empty: + drop_sql = r""" +DO $$ DECLARE r RECORD; +BEGIN + FOR r IN ( + SELECT table_name AS name, 'TABLE' AS type FROM information_schema.tables WHERE table_schema='public' + UNION ALL + SELECT routine_name AS name, 'FUNCTION' AS type FROM information_schema.routines WHERE specific_schema='public' + UNION ALL + SELECT sequence_name AS name, 'SEQUENCE' AS type FROM information_schema.sequences WHERE sequence_schema='public' + ) LOOP + EXECUTE format('DROP %s public.%I CASCADE', r.type, r.name); + END LOOP; +END $$; +""" + docker_exec( + container, + ["psql", "-v", "ON_ERROR_STOP=1", "-U", user, "-d", db_name], + stdin=drop_sql.encode(), + docker_env=docker_env, + ) + + with open(sql_path, "rb") as f: + docker_exec( + container, + ["psql", "-v", "ON_ERROR_STOP=1", "-U", user, "-d", db_name], + stdin=f, + docker_env=docker_env, + ) + + print(f"PostgreSQL restore complete for db '{db_name}'.") diff --git a/src/baudolo/restore/files.py b/src/baudolo/restore/files.py new file mode 100644 index 0000000..28db596 --- /dev/null +++ b/src/baudolo/restore/files.py @@ -0,0 +1,37 @@ +from __future__ import annotations + +import os +import sys + +from .run import run, docker_volume_exists + + +def restore_volume_files(volume_name: str, backup_files_dir: str, *, rsync_image: str) -> int: + if not os.path.isdir(backup_files_dir): + print(f"ERROR: backup files dir not found: {backup_files_dir}", file=sys.stderr) + return 2 + + if not docker_volume_exists(volume_name): + print(f"Volume {volume_name} does not exist. Creating...") + run(["docker", "volume", "create", volume_name]) + else: + print(f"Volume {volume_name} already exists.") + + # Keep behavior close to the old script: rsync -avv --delete + run( + [ + "docker", + "run", + "--rm", + "-v", + f"{volume_name}:/recover/", + "-v", + f"{backup_files_dir}:/backup/", + rsync_image, + "sh", + "-lc", + "rsync -avv --delete /backup/ /recover/", + ] + ) + print("File restore complete.") + return 0 diff --git a/src/baudolo/restore/paths.py b/src/baudolo/restore/paths.py new file mode 100644 index 0000000..a037321 --- /dev/null +++ b/src/baudolo/restore/paths.py @@ -0,0 +1,29 @@ +from __future__ import annotations + +import os +from dataclasses import dataclass + + +@dataclass(frozen=True) +class BackupPaths: + volume_name: str + backup_hash: str + version: str + repo_name: str + backups_dir: str = "/Backups" + + def root(self) -> str: + # Always build an absolute path under backups_dir + return os.path.join( + self.backups_dir, + self.backup_hash, + self.repo_name, + self.version, + self.volume_name, + ) + + def files_dir(self) -> str: + return os.path.join(self.root(), "files") + + def sql_file(self, db_name: str) -> str: + return os.path.join(self.root(), "sql", f"{db_name}.backup.sql") diff --git a/src/baudolo/restore/run.py b/src/baudolo/restore/run.py new file mode 100644 index 0000000..05fea8c --- /dev/null +++ b/src/baudolo/restore/run.py @@ -0,0 +1,81 @@ +from __future__ import annotations + +import subprocess +import sys +from typing import Optional + + +def run( + cmd: list[str], + *, + stdin=None, + capture: bool = False, + env: Optional[dict] = None, +) -> subprocess.CompletedProcess: + try: + return subprocess.run( + cmd, + check=True, + stdin=stdin, + capture_output=capture, + env=env, + ) + except subprocess.CalledProcessError as e: + msg = f"ERROR: command failed ({e.returncode}): {' '.join(cmd)}" + print(msg, file=sys.stderr) + if e.stdout: + try: + print(e.stdout.decode(), file=sys.stderr) + except Exception: + print(e.stdout, file=sys.stderr) + if e.stderr: + try: + print(e.stderr.decode(), file=sys.stderr) + except Exception: + print(e.stderr, file=sys.stderr) + raise + + +def docker_exec( + container: str, + argv: list[str], + *, + stdin=None, + capture: bool = False, + env: Optional[dict] = None, + docker_env: Optional[dict[str, str]] = None, +) -> subprocess.CompletedProcess: + cmd: list[str] = ["docker", "exec", "-i"] + if docker_env: + for k, v in docker_env.items(): + cmd.extend(["-e", f"{k}={v}"]) + cmd.extend([container, *argv]) + return run(cmd, stdin=stdin, capture=capture, env=env) + + +def docker_exec_sh( + container: str, + script: str, + *, + stdin=None, + capture: bool = False, + env: Optional[dict] = None, + docker_env: Optional[dict[str, str]] = None, +) -> subprocess.CompletedProcess: + return docker_exec( + container, + ["sh", "-lc", script], + stdin=stdin, + capture=capture, + env=env, + docker_env=docker_env, + ) + + +def docker_volume_exists(volume: str) -> bool: + p = subprocess.run( + ["docker", "volume", "inspect", volume], + stdout=subprocess.DEVNULL, + stderr=subprocess.DEVNULL, + ) + return p.returncode == 0 diff --git a/tests/e2e/__init__.py b/tests/e2e/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/tests/e2e/helpers.py b/tests/e2e/helpers.py new file mode 100644 index 0000000..2412e60 --- /dev/null +++ b/tests/e2e/helpers.py @@ -0,0 +1,176 @@ +# tests/e2e/helpers.py +from __future__ import annotations + +import shutil +import subprocess +import time +import uuid +from pathlib import Path + + +def run(cmd: list[str], *, capture: bool = True, check: bool = True, cwd: str | None = None) -> subprocess.CompletedProcess: + return subprocess.run( + cmd, + check=check, + cwd=cwd, + text=True, + capture_output=capture, + ) + + +def sh(cmd: str, *, capture: bool = True, check: bool = True) -> subprocess.CompletedProcess: + return run(["sh", "-lc", cmd], capture=capture, check=check) + + +def unique(prefix: str) -> str: + return f"{prefix}-{uuid.uuid4().hex[:10]}" + + +def require_docker() -> None: + run(["docker", "version"], capture=True, check=True) + + +def machine_hash() -> str: + out = sh("sha256sum /etc/machine-id | awk '{print $1}'").stdout.strip() + if len(out) < 16: + raise RuntimeError("Could not determine machine hash from /etc/machine-id") + return out + + +def wait_for_log(container: str, pattern: str, timeout_s: int = 60) -> None: + deadline = time.time() + timeout_s + while time.time() < deadline: + p = run(["docker", "logs", container], capture=True, check=False) + if pattern in (p.stdout or ""): + return + time.sleep(1) + raise TimeoutError(f"Timed out waiting for log pattern '{pattern}' in {container}") + + +def wait_for_postgres(container: str, *, user: str = "postgres", timeout_s: int = 90) -> None: + """ + Docker-outside-of-Docker friendly readiness: check from inside the DB container. + """ + deadline = time.time() + timeout_s + while time.time() < deadline: + p = run( + ["docker", "exec", container, "sh", "-lc", f"pg_isready -U {user} -h localhost"], + capture=True, + check=False, + ) + if p.returncode == 0: + return + time.sleep(1) + raise TimeoutError(f"Timed out waiting for Postgres readiness in container {container}") + + +def wait_for_mariadb(container: str, *, root_password: str, timeout_s: int = 90) -> None: + """ + Docker-outside-of-Docker friendly readiness: check from inside the DB container. + """ + deadline = time.time() + timeout_s + while time.time() < deadline: + # mariadb-admin is present in the official mariadb image + p = run( + ["docker", "exec", container, "sh", "-lc", f"mariadb-admin -uroot -p{root_password} ping -h localhost"], + capture=True, + check=False, + ) + if p.returncode == 0: + return + time.sleep(1) + raise TimeoutError(f"Timed out waiting for MariaDB readiness in container {container}") + + +def backup_run( + *, + backups_dir: str, + repo_name: str, + compose_dir: str, + databases_csv: str, + database_containers: list[str], + images_no_stop_required: list[str], + images_no_backup_required: list[str] | None = None, + dump_only: bool = False, +) -> None: + cmd = [ + "baudolo", + "--compose-dir", compose_dir, + "--docker-compose-hard-restart-required", "mailu", + "--repo-name", repo_name, + "--databases-csv", databases_csv, + "--backups-dir", backups_dir, + "--database-containers", *database_containers, + "--images-no-stop-required", *images_no_stop_required, + ] + if images_no_backup_required: + cmd += ["--images-no-backup-required", *images_no_backup_required] + if dump_only: + cmd += ["--dump-only"] + + try: + run(cmd, capture=True, check=True) + except subprocess.CalledProcessError as e: + # Print captured output so failing E2E tests are "live" / debuggable in CI logs + print(">>> baudolo failed (exit code:", e.returncode, ")") + if e.stdout: + print(">>> baudolo STDOUT:\n" + e.stdout) + if e.stderr: + print(">>> baudolo STDERR:\n" + e.stderr) + raise + + +def latest_version_dir(backups_dir: str, repo_name: str) -> tuple[str, str]: + """ + Returns (hash, version) for the latest backup. + """ + h = machine_hash() + root = Path(backups_dir) / h / repo_name + if not root.is_dir(): + raise FileNotFoundError(str(root)) + + versions = sorted([p.name for p in root.iterdir() if p.is_dir()]) + if not versions: + raise RuntimeError(f"No versions found under {root}") + return h, versions[-1] + + +def backup_path(backups_dir: str, repo_name: str, version: str, volume: str) -> Path: + h = machine_hash() + return Path(backups_dir) / h / repo_name / version / volume + + +def create_minimal_compose_dir(base: str) -> str: + """ + baudolo requires --compose-dir. Create an empty dir with one non-compose subdir. + """ + p = Path(base) / "compose-root" + p.mkdir(parents=True, exist_ok=True) + (p / "noop").mkdir(parents=True, exist_ok=True) + return str(p) + + +def write_databases_csv(path: str, rows: list[tuple[str, str, str, str]]) -> None: + """ + rows: (instance, database, username, password) + database may be '' (empty) to trigger pg_dumpall behavior if you want, but here we use db name. + """ + Path(path).parent.mkdir(parents=True, exist_ok=True) + with open(path, "w", encoding="utf-8") as f: + f.write("instance;database;username;password\n") + for inst, db, user, pw in rows: + f.write(f"{inst};{db};{user};{pw}\n") + + +def cleanup_docker(*, containers: list[str], volumes: list[str]) -> None: + for c in containers: + run(["docker", "rm", "-f", c], capture=True, check=False) + for v in volumes: + run(["docker", "volume", "rm", "-f", v], capture=True, check=False) + + +def ensure_empty_dir(path: str) -> None: + p = Path(path) + if p.exists(): + shutil.rmtree(p) + p.mkdir(parents=True, exist_ok=True) diff --git a/tests/e2e/test_e2e_files_full.py b/tests/e2e/test_e2e_files_full.py new file mode 100644 index 0000000..19e60eb --- /dev/null +++ b/tests/e2e/test_e2e_files_full.py @@ -0,0 +1,84 @@ +import unittest +from pathlib import Path + +from .helpers import ( + backup_run, + backup_path, + cleanup_docker, + create_minimal_compose_dir, + ensure_empty_dir, + latest_version_dir, + require_docker, + unique, + write_databases_csv, + run, +) + + +class TestE2EFilesFull(unittest.TestCase): + @classmethod + def setUpClass(cls) -> None: + require_docker() + cls.prefix = unique("baudolo-e2e-files-full") + cls.backups_dir = f"/tmp/{cls.prefix}/Backups" + ensure_empty_dir(cls.backups_dir) + + cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}") + cls.repo_name = cls.prefix + + cls.volume_src = f"{cls.prefix}-vol-src" + cls.volume_dst = f"{cls.prefix}-vol-dst" + cls.containers = [] + cls.volumes = [cls.volume_src, cls.volume_dst] + + # create source volume with a file + run(["docker", "volume", "create", cls.volume_src]) + run([ + "docker", "run", "--rm", + "-v", f"{cls.volume_src}:/data", + "alpine:3.20", + "sh", "-lc", "mkdir -p /data && echo 'hello' > /data/hello.txt", + ]) + + # databases.csv (unused, but required by CLI) + cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv" + write_databases_csv(cls.databases_csv, []) + + # Run backup (files should be copied) + backup_run( + backups_dir=cls.backups_dir, + repo_name=cls.repo_name, + compose_dir=cls.compose_dir, + databases_csv=cls.databases_csv, + database_containers=["dummy-db"], + images_no_stop_required=["alpine", "postgres", "mariadb", "mysql"], + ) + + cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name) + + @classmethod + def tearDownClass(cls) -> None: + cleanup_docker(containers=cls.containers, volumes=cls.volumes) + + def test_files_backup_exists(self) -> None: + p = backup_path(self.backups_dir, self.repo_name, self.version, self.volume_src) / "files" / "hello.txt" + self.assertTrue(p.is_file(), f"Expected backed up file at: {p}") + + def test_restore_files_into_new_volume(self) -> None: + # restore files into dst volume + run([ + "baudolo-restore", "files", + self.volume_dst, self.hash, self.version, + "--backups-dir", self.backups_dir, + "--repo-name", self.repo_name, + "--rsync-image", "ghcr.io/kevinveenbirkenbach/alpine-rsync", + ]) + + # verify restored file exists in dst volume + p = run([ + "docker", "run", "--rm", + "-v", f"{self.volume_dst}:/data", + "alpine:3.20", + "sh", "-lc", "cat /data/hello.txt", + ]) + self.assertEqual((p.stdout or "").strip(), "hello") diff --git a/tests/e2e/test_e2e_files_no_copy.py b/tests/e2e/test_e2e_files_no_copy.py new file mode 100644 index 0000000..fb711ce --- /dev/null +++ b/tests/e2e/test_e2e_files_no_copy.py @@ -0,0 +1,72 @@ +import unittest + +from .helpers import ( + backup_run, + backup_path, + cleanup_docker, + create_minimal_compose_dir, + ensure_empty_dir, + latest_version_dir, + require_docker, + unique, + write_databases_csv, + run, +) + + +class TestE2EFilesNoCopy(unittest.TestCase): + @classmethod + def setUpClass(cls) -> None: + require_docker() + cls.prefix = unique("baudolo-e2e-files-nocopy") + cls.backups_dir = f"/tmp/{cls.prefix}/Backups" + ensure_empty_dir(cls.backups_dir) + + cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}") + cls.repo_name = cls.prefix + + cls.volume_src = f"{cls.prefix}-vol-src" + cls.volume_dst = f"{cls.prefix}-vol-dst" + cls.containers = [] + cls.volumes = [cls.volume_src, cls.volume_dst] + + run(["docker", "volume", "create", cls.volume_src]) + run([ + "docker", "run", "--rm", + "-v", f"{cls.volume_src}:/data", + "alpine:3.20", + "sh", "-lc", "echo 'hello' > /data/hello.txt", + ]) + + cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv" + write_databases_csv(cls.databases_csv, []) + + # dump-only => NO file rsync backups + backup_run( + backups_dir=cls.backups_dir, + repo_name=cls.repo_name, + compose_dir=cls.compose_dir, + databases_csv=cls.databases_csv, + database_containers=["dummy-db"], + images_no_stop_required=["alpine", "postgres", "mariadb", "mysql"], + dump_only=True, + ) + + cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name) + + @classmethod + def tearDownClass(cls) -> None: + cleanup_docker(containers=cls.containers, volumes=cls.volumes) + + def test_files_backup_not_present(self) -> None: + p = backup_path(self.backups_dir, self.repo_name, self.version, self.volume_src) / "files" + self.assertFalse(p.exists(), f"Did not expect files backup dir at: {p}") + + def test_restore_files_fails_expected(self) -> None: + p = run([ + "baudolo-restore", "files", + self.volume_dst, self.hash, self.version, + "--backups-dir", self.backups_dir, + "--repo-name", self.repo_name, + ], check=False) + self.assertEqual(p.returncode, 2, f"Expected exitcode 2, got {p.returncode}\nSTDOUT={p.stdout}\nSTDERR={p.stderr}") diff --git a/tests/e2e/test_e2e_mariadb_full.py b/tests/e2e/test_e2e_mariadb_full.py new file mode 100644 index 0000000..620a145 --- /dev/null +++ b/tests/e2e/test_e2e_mariadb_full.py @@ -0,0 +1,105 @@ +# tests/e2e/test_e2e_mariadb_full.py +import unittest + +from .helpers import ( + backup_run, + backup_path, + cleanup_docker, + create_minimal_compose_dir, + ensure_empty_dir, + latest_version_dir, + require_docker, + unique, + write_databases_csv, + run, + wait_for_mariadb, +) + + +class TestE2EMariaDBFull(unittest.TestCase): + @classmethod + def setUpClass(cls) -> None: + require_docker() + cls.prefix = unique("baudolo-e2e-mariadb-full") + cls.backups_dir = f"/tmp/{cls.prefix}/Backups" + ensure_empty_dir(cls.backups_dir) + cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}") + cls.repo_name = cls.prefix + + cls.db_container = f"{cls.prefix}-mariadb" + cls.db_volume = f"{cls.prefix}-mariadb-vol" + cls.containers = [cls.db_container] + cls.volumes = [cls.db_volume] + + run(["docker", "volume", "create", cls.db_volume]) + + # Start MariaDB (no host port publishing needed; we will exec into the container) + run([ + "docker", "run", "-d", + "--name", cls.db_container, + "-e", "MARIADB_ROOT_PASSWORD=rootpw", + "-v", f"{cls.db_volume}:/var/lib/mysql", + "mariadb:11", + ]) + wait_for_mariadb(cls.db_container, root_password="rootpw", timeout_s=90) + + # Create DB + data + run([ + "docker", "exec", cls.db_container, + "sh", "-lc", + "mariadb -uroot -prootpw -e \"CREATE DATABASE appdb; " + "CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); " + "INSERT INTO appdb.t VALUES (1,'ok');\"", + ]) + + cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv" + instance = cls.db_container + write_databases_csv(cls.databases_csv, [(instance, "appdb", "root", "rootpw")]) + + # Backup with file+dump + backup_run( + backups_dir=cls.backups_dir, + repo_name=cls.repo_name, + compose_dir=cls.compose_dir, + databases_csv=cls.databases_csv, + database_containers=[cls.db_container], + images_no_stop_required=["mariadb", "mysql", "alpine", "postgres"], + ) + + cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name) + + # Wipe DB + run([ + "docker", "exec", cls.db_container, + "sh", "-lc", + "mariadb -uroot -prootpw -e \"DROP DATABASE appdb;\"", + ]) + + # Restore DB + run([ + "baudolo-restore", "mariadb", + cls.db_volume, cls.hash, cls.version, + "--backups-dir", cls.backups_dir, + "--repo-name", cls.repo_name, + "--container", cls.db_container, + "--db-name", "appdb", + "--db-user", "root", + "--db-password", "rootpw", + "--empty", + ]) + + @classmethod + def tearDownClass(cls) -> None: + cleanup_docker(containers=cls.containers, volumes=cls.volumes) + + def test_dump_file_exists(self) -> None: + p = backup_path(self.backups_dir, self.repo_name, self.version, self.db_volume) / "sql" / "appdb.backup.sql" + self.assertTrue(p.is_file(), f"Expected dump file at: {p}") + + def test_data_restored(self) -> None: + p = run([ + "docker", "exec", self.db_container, + "sh", "-lc", + "mariadb -uroot -prootpw -N -e \"SELECT v FROM appdb.t WHERE id=1;\"", + ]) + self.assertEqual((p.stdout or "").strip(), "ok") diff --git a/tests/e2e/test_e2e_mariadb_no_copy.py b/tests/e2e/test_e2e_mariadb_no_copy.py new file mode 100644 index 0000000..47d362c --- /dev/null +++ b/tests/e2e/test_e2e_mariadb_no_copy.py @@ -0,0 +1,102 @@ +# tests/e2e/test_e2e_mariadb_no_copy.py +import unittest + +from .helpers import ( + backup_run, + backup_path, + cleanup_docker, + create_minimal_compose_dir, + ensure_empty_dir, + latest_version_dir, + require_docker, + unique, + write_databases_csv, + run, + wait_for_mariadb, +) + + +class TestE2EMariaDBNoCopy(unittest.TestCase): + @classmethod + def setUpClass(cls) -> None: + require_docker() + cls.prefix = unique("baudolo-e2e-mariadb-nocopy") + cls.backups_dir = f"/tmp/{cls.prefix}/Backups" + ensure_empty_dir(cls.backups_dir) + cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}") + cls.repo_name = cls.prefix + + cls.db_container = f"{cls.prefix}-mariadb" + cls.db_volume = f"{cls.prefix}-mariadb-vol" + cls.containers = [cls.db_container] + cls.volumes = [cls.db_volume] + + run(["docker", "volume", "create", cls.db_volume]) + run([ + "docker", "run", "-d", + "--name", cls.db_container, + "-e", "MARIADB_ROOT_PASSWORD=rootpw", + "-v", f"{cls.db_volume}:/var/lib/mysql", + "mariadb:11", + ]) + wait_for_mariadb(cls.db_container, root_password="rootpw", timeout_s=90) + + run([ + "docker", "exec", cls.db_container, + "sh", "-lc", + "mariadb -uroot -prootpw -e \"CREATE DATABASE appdb; " + "CREATE TABLE appdb.t (id INT PRIMARY KEY, v VARCHAR(50)); " + "INSERT INTO appdb.t VALUES (1,'ok');\"", + ]) + + cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv" + write_databases_csv(cls.databases_csv, [(cls.db_container, "appdb", "root", "rootpw")]) + + # dump-only => no files + backup_run( + backups_dir=cls.backups_dir, + repo_name=cls.repo_name, + compose_dir=cls.compose_dir, + databases_csv=cls.databases_csv, + database_containers=[cls.db_container], + images_no_stop_required=["mariadb", "mysql", "alpine", "postgres"], + dump_only=True, + ) + + cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name) + + # Wipe DB + run([ + "docker", "exec", cls.db_container, + "sh", "-lc", + "mariadb -uroot -prootpw -e \"DROP DATABASE appdb;\"", + ]) + + # Restore DB + run([ + "baudolo-restore", "mariadb", + cls.db_volume, cls.hash, cls.version, + "--backups-dir", cls.backups_dir, + "--repo-name", cls.repo_name, + "--container", cls.db_container, + "--db-name", "appdb", + "--db-user", "root", + "--db-password", "rootpw", + "--empty", + ]) + + @classmethod + def tearDownClass(cls) -> None: + cleanup_docker(containers=cls.containers, volumes=cls.volumes) + + def test_files_backup_not_present(self) -> None: + p = backup_path(self.backups_dir, self.repo_name, self.version, self.db_volume) / "files" + self.assertFalse(p.exists(), f"Did not expect files backup dir at: {p}") + + def test_data_restored(self) -> None: + p = run([ + "docker", "exec", self.db_container, + "sh", "-lc", + "mariadb -uroot -prootpw -N -e \"SELECT v FROM appdb.t WHERE id=1;\"", + ]) + self.assertEqual((p.stdout or "").strip(), "ok") diff --git a/tests/e2e/test_e2e_postgres_full.py b/tests/e2e/test_e2e_postgres_full.py new file mode 100644 index 0000000..bf85d42 --- /dev/null +++ b/tests/e2e/test_e2e_postgres_full.py @@ -0,0 +1,102 @@ +# tests/e2e/test_e2e_postgres_full.py +import unittest + +from .helpers import ( + backup_run, + backup_path, + cleanup_docker, + create_minimal_compose_dir, + ensure_empty_dir, + latest_version_dir, + require_docker, + unique, + write_databases_csv, + run, + wait_for_postgres, +) + + +class TestE2EPostgresFull(unittest.TestCase): + @classmethod + def setUpClass(cls) -> None: + require_docker() + cls.prefix = unique("baudolo-e2e-postgres-full") + cls.backups_dir = f"/tmp/{cls.prefix}/Backups" + ensure_empty_dir(cls.backups_dir) + cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}") + cls.repo_name = cls.prefix + + cls.pg_container = f"{cls.prefix}-pg" + cls.pg_volume = f"{cls.prefix}-pg-vol" + cls.containers = [cls.pg_container] + cls.volumes = [cls.pg_volume] + + run(["docker", "volume", "create", cls.pg_volume]) + + run([ + "docker", "run", "-d", + "--name", cls.pg_container, + "-e", "POSTGRES_PASSWORD=pgpw", + "-e", "POSTGRES_DB=appdb", + "-e", "POSTGRES_USER=postgres", + "-v", f"{cls.pg_volume}:/var/lib/postgresql/data", + "postgres:16", + ]) + wait_for_postgres(cls.pg_container, user="postgres", timeout_s=90) + + # Create a table + data + run([ + "docker", "exec", cls.pg_container, + "sh", "-lc", + "psql -U postgres -d appdb -c \"CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');\"", + ]) + + cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv" + write_databases_csv(cls.databases_csv, [(cls.pg_container, "appdb", "postgres", "pgpw")]) + + backup_run( + backups_dir=cls.backups_dir, + repo_name=cls.repo_name, + compose_dir=cls.compose_dir, + databases_csv=cls.databases_csv, + database_containers=[cls.pg_container], + images_no_stop_required=["postgres", "mariadb", "mysql", "alpine"], + ) + + cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name) + + # Wipe schema + run([ + "docker", "exec", cls.pg_container, + "sh", "-lc", + "psql -U postgres -d appdb -c \"DROP TABLE t;\"", + ]) + + # Restore + run([ + "baudolo-restore", "postgres", + cls.pg_volume, cls.hash, cls.version, + "--backups-dir", cls.backups_dir, + "--repo-name", cls.repo_name, + "--container", cls.pg_container, + "--db-name", "appdb", + "--db-user", "postgres", + "--db-password", "pgpw", + "--empty", + ]) + + @classmethod + def tearDownClass(cls) -> None: + cleanup_docker(containers=cls.containers, volumes=cls.volumes) + + def test_dump_file_exists(self) -> None: + p = backup_path(self.backups_dir, self.repo_name, self.version, self.pg_volume) / "sql" / "appdb.backup.sql" + self.assertTrue(p.is_file(), f"Expected dump file at: {p}") + + def test_data_restored(self) -> None: + p = run([ + "docker", "exec", self.pg_container, + "sh", "-lc", + "psql -U postgres -d appdb -t -c \"SELECT v FROM t WHERE id=1;\"", + ]) + self.assertEqual((p.stdout or "").strip(), "ok") diff --git a/tests/e2e/test_e2e_postgres_no_copy.py b/tests/e2e/test_e2e_postgres_no_copy.py new file mode 100644 index 0000000..44cc345 --- /dev/null +++ b/tests/e2e/test_e2e_postgres_no_copy.py @@ -0,0 +1,99 @@ +# tests/e2e/test_e2e_postgres_no_copy.py +import unittest + +from .helpers import ( + backup_run, + backup_path, + cleanup_docker, + create_minimal_compose_dir, + ensure_empty_dir, + latest_version_dir, + require_docker, + unique, + write_databases_csv, + run, + wait_for_postgres, +) + + +class TestE2EPostgresNoCopy(unittest.TestCase): + @classmethod + def setUpClass(cls) -> None: + require_docker() + cls.prefix = unique("baudolo-e2e-postgres-nocopy") + cls.backups_dir = f"/tmp/{cls.prefix}/Backups" + ensure_empty_dir(cls.backups_dir) + cls.compose_dir = create_minimal_compose_dir(f"/tmp/{cls.prefix}") + cls.repo_name = cls.prefix + + cls.pg_container = f"{cls.prefix}-pg" + cls.pg_volume = f"{cls.prefix}-pg-vol" + cls.containers = [cls.pg_container] + cls.volumes = [cls.pg_volume] + + run(["docker", "volume", "create", cls.pg_volume]) + run([ + "docker", "run", "-d", + "--name", cls.pg_container, + "-e", "POSTGRES_PASSWORD=pgpw", + "-e", "POSTGRES_DB=appdb", + "-e", "POSTGRES_USER=postgres", + "-v", f"{cls.pg_volume}:/var/lib/postgresql/data", + "postgres:16", + ]) + wait_for_postgres(cls.pg_container, user="postgres", timeout_s=90) + + run([ + "docker", "exec", cls.pg_container, + "sh", "-lc", + "psql -U postgres -d appdb -c \"CREATE TABLE t (id int primary key, v text); INSERT INTO t VALUES (1,'ok');\"", + ]) + + cls.databases_csv = f"/tmp/{cls.prefix}/databases.csv" + write_databases_csv(cls.databases_csv, [(cls.pg_container, "appdb", "postgres", "pgpw")]) + + backup_run( + backups_dir=cls.backups_dir, + repo_name=cls.repo_name, + compose_dir=cls.compose_dir, + databases_csv=cls.databases_csv, + database_containers=[cls.pg_container], + images_no_stop_required=["postgres", "mariadb", "mysql", "alpine"], + dump_only=True, + ) + + cls.hash, cls.version = latest_version_dir(cls.backups_dir, cls.repo_name) + + run([ + "docker", "exec", cls.pg_container, + "sh", "-lc", + "psql -U postgres -d appdb -c \"DROP TABLE t;\"", + ]) + + run([ + "baudolo-restore", "postgres", + cls.pg_volume, cls.hash, cls.version, + "--backups-dir", cls.backups_dir, + "--repo-name", cls.repo_name, + "--container", cls.pg_container, + "--db-name", "appdb", + "--db-user", "postgres", + "--db-password", "pgpw", + "--empty", + ]) + + @classmethod + def tearDownClass(cls) -> None: + cleanup_docker(containers=cls.containers, volumes=cls.volumes) + + def test_files_backup_not_present(self) -> None: + p = backup_path(self.backups_dir, self.repo_name, self.version, self.pg_volume) / "files" + self.assertFalse(p.exists(), f"Did not expect files backup dir at: {p}") + + def test_data_restored(self) -> None: + p = run([ + "docker", "exec", self.pg_container, + "sh", "-lc", + "psql -U postgres -d appdb -t -c \"SELECT v FROM t WHERE id=1;\"", + ]) + self.assertEqual((p.stdout or "").strip(), "ok") diff --git a/tests/unit/test_backup.py b/tests/unit/test_backup.py index ca9110a..1e685a2 100644 --- a/tests/unit/test_backup.py +++ b/tests/unit/test_backup.py @@ -1,64 +1,36 @@ -# tests/unit/test_backup.py - import unittest from unittest.mock import patch -import importlib.util -import sys -import os -import pathlib -# Prevent actual directory creation in backup script import -dummy_mkdir = lambda self, *args, **kwargs: None -original_mkdir = pathlib.Path.mkdir -pathlib.Path.mkdir = dummy_mkdir +from baudolo.backup.app import requires_stop -# Create a virtual databases.csv in the project root for the module import -test_dir = os.path.dirname(__file__) -project_root = os.path.abspath(os.path.join(test_dir, '../../')) -sys.path.insert(0, project_root) -db_csv_path = os.path.join(project_root, 'databases.csv') -with open(db_csv_path, 'w') as f: - f.write('instance;database;username;password\n') -# Dynamically load the hyphenated script as module 'backup' -script_path = os.path.join(project_root, 'backup-docker-to-local.py') -spec = importlib.util.spec_from_file_location('backup', script_path) -backup = importlib.util.module_from_spec(spec) -sys.modules['backup'] = backup -spec.loader.exec_module(backup) +class TestRequiresStop(unittest.TestCase): + @patch("baudolo.backup.app.get_image_info") + def test_requires_stop_false_when_all_images_are_whitelisted(self, mock_get_image_info): + # All containers use images containing allowed substrings + mock_get_image_info.side_effect = [ + "repo/mastodon:v4", + "repo/wordpress:latest", + ] + containers = ["c1", "c2"] + whitelist = ["mastodon", "wordpress"] + self.assertFalse(requires_stop(containers, whitelist)) -# Restore original mkdir -pathlib.Path.mkdir = original_mkdir + @patch("baudolo.backup.app.get_image_info") + def test_requires_stop_true_when_any_image_is_not_whitelisted(self, mock_get_image_info): + mock_get_image_info.side_effect = [ + "repo/mastodon:v4", + "repo/nginx:latest", + ] + containers = ["c1", "c2"] + whitelist = ["mastodon", "wordpress"] + self.assertTrue(requires_stop(containers, whitelist)) -class TestIsImageWhitelisted(unittest.TestCase): - @patch('backup.get_image_info') - def test_returns_true_when_image_matches(self, mock_get_image_info): - # Simulate a container image containing 'mastodon' - mock_get_image_info.return_value = ['repo/mastodon:v4'] - images = ['mastodon', 'wordpress'] - self.assertTrue( - backup.is_image_whitelisted('any_container', images), - "Should return True when at least one image substring matches" - ) + @patch("baudolo.backup.app.get_image_info") + def test_requires_stop_true_when_whitelist_empty(self, mock_get_image_info): + mock_get_image_info.return_value = "repo/anything:latest" + self.assertTrue(requires_stop(["c1"], [])) - @patch('backup.get_image_info') - def test_returns_false_when_no_image_matches(self, mock_get_image_info): - # Simulate a container image without matching substrings - mock_get_image_info.return_value = ['repo/nginx:latest'] - images = ['mastodon', 'wordpress'] - self.assertFalse( - backup.is_image_whitelisted('any_container', images), - "Should return False when no image substring matches" - ) - @patch('backup.get_image_info') - def test_returns_false_with_empty_image_list(self, mock_get_image_info): - # Even if get_image_info returns something, an empty list yields False - mock_get_image_info.return_value = ['repo/element:1.0'] - self.assertFalse( - backup.is_image_whitelisted('any_container', []), - "Should return False when the images list is empty" - ) - -if __name__ == '__main__': +if __name__ == "__main__": unittest.main()